Feb 8 23:17:59.049329 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 8 23:17:59.049364 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:17:59.049378 kernel: BIOS-provided physical RAM map: Feb 8 23:17:59.049389 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 8 23:17:59.049399 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 8 23:17:59.049410 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 8 23:17:59.049425 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 8 23:17:59.049436 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 8 23:17:59.049446 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 8 23:17:59.049457 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 8 23:17:59.049468 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 8 23:17:59.049478 kernel: printk: bootconsole [earlyser0] enabled Feb 8 23:17:59.049489 kernel: NX (Execute Disable) protection: active Feb 8 23:17:59.049500 kernel: efi: EFI v2.70 by Microsoft Feb 8 23:17:59.049516 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Feb 8 23:17:59.049528 kernel: random: crng init done Feb 8 23:17:59.049540 kernel: SMBIOS 3.1.0 present. Feb 8 23:17:59.049551 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 8 23:17:59.049563 kernel: Hypervisor detected: Microsoft Hyper-V Feb 8 23:17:59.049575 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 8 23:17:59.049586 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 8 23:17:59.049598 kernel: Hyper-V: Nested features: 0x1e0101 Feb 8 23:17:59.049612 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 8 23:17:59.049623 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 8 23:17:59.049635 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 8 23:17:59.049647 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 8 23:17:59.049659 kernel: tsc: Detected 2593.905 MHz processor Feb 8 23:17:59.049671 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 8 23:17:59.049683 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 8 23:17:59.049695 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 8 23:17:59.049707 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 8 23:17:59.049719 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 8 23:17:59.049733 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 8 23:17:59.049745 kernel: Using GB pages for direct mapping Feb 8 23:17:59.049756 kernel: Secure boot disabled Feb 8 23:17:59.049769 kernel: ACPI: Early table checksum verification disabled Feb 8 23:17:59.049781 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 8 23:17:59.049792 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049804 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049816 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 8 23:17:59.049835 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 8 23:17:59.049848 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049861 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049874 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049886 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049899 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049914 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049927 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 8 23:17:59.049940 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 8 23:17:59.049952 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 8 23:17:59.049965 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 8 23:17:59.049978 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 8 23:17:59.049991 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 8 23:17:59.050004 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 8 23:17:59.050019 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 8 23:17:59.050032 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 8 23:17:59.050045 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 8 23:17:59.050058 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 8 23:17:59.050070 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 8 23:17:59.050083 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 8 23:17:59.050096 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 8 23:17:59.050108 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 8 23:17:59.050144 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 8 23:17:59.050160 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 8 23:17:59.050176 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 8 23:17:59.050189 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 8 23:17:59.050202 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 8 23:17:59.050214 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 8 23:17:59.050227 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 8 23:17:59.050240 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 8 23:17:59.050252 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 8 23:17:59.050265 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 8 23:17:59.050281 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 8 23:17:59.050294 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 8 23:17:59.050307 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 8 23:17:59.050319 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 8 23:17:59.050333 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 8 23:17:59.050345 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 8 23:17:59.050358 kernel: Zone ranges: Feb 8 23:17:59.050371 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 8 23:17:59.050384 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 8 23:17:59.050399 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 8 23:17:59.050411 kernel: Movable zone start for each node Feb 8 23:17:59.050424 kernel: Early memory node ranges Feb 8 23:17:59.050437 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 8 23:17:59.050450 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 8 23:17:59.050462 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 8 23:17:59.050475 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 8 23:17:59.050488 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 8 23:17:59.050501 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 8 23:17:59.050516 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 8 23:17:59.050529 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 8 23:17:59.050541 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 8 23:17:59.050554 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 8 23:17:59.050567 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 8 23:17:59.050580 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 8 23:17:59.050593 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 8 23:17:59.050605 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 8 23:17:59.050617 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 8 23:17:59.050633 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 8 23:17:59.050646 kernel: Booting paravirtualized kernel on Hyper-V Feb 8 23:17:59.050659 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 8 23:17:59.050673 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 8 23:17:59.050685 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 8 23:17:59.050698 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 8 23:17:59.050711 kernel: pcpu-alloc: [0] 0 1 Feb 8 23:17:59.050723 kernel: Hyper-V: PV spinlocks enabled Feb 8 23:17:59.050736 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 8 23:17:59.050751 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 8 23:17:59.050763 kernel: Policy zone: Normal Feb 8 23:17:59.050778 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:17:59.050791 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 8 23:17:59.050804 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 8 23:17:59.050817 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 8 23:17:59.050829 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 8 23:17:59.050842 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 8 23:17:59.050858 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 8 23:17:59.050872 kernel: ftrace: allocating 34475 entries in 135 pages Feb 8 23:17:59.050894 kernel: ftrace: allocated 135 pages with 4 groups Feb 8 23:17:59.050910 kernel: rcu: Hierarchical RCU implementation. Feb 8 23:17:59.050924 kernel: rcu: RCU event tracing is enabled. Feb 8 23:17:59.050938 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 8 23:17:59.050951 kernel: Rude variant of Tasks RCU enabled. Feb 8 23:17:59.050964 kernel: Tracing variant of Tasks RCU enabled. Feb 8 23:17:59.050978 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 8 23:17:59.050992 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 8 23:17:59.051005 kernel: Using NULL legacy PIC Feb 8 23:17:59.051021 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 8 23:17:59.051035 kernel: Console: colour dummy device 80x25 Feb 8 23:17:59.051048 kernel: printk: console [tty1] enabled Feb 8 23:17:59.051062 kernel: printk: console [ttyS0] enabled Feb 8 23:17:59.051075 kernel: printk: bootconsole [earlyser0] disabled Feb 8 23:17:59.051092 kernel: ACPI: Core revision 20210730 Feb 8 23:17:59.051105 kernel: Failed to register legacy timer interrupt Feb 8 23:17:59.051126 kernel: APIC: Switch to symmetric I/O mode setup Feb 8 23:17:59.051137 kernel: Hyper-V: Using IPI hypercalls Feb 8 23:17:59.051148 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Feb 8 23:17:59.051159 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 8 23:17:59.051169 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 8 23:17:59.051181 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 8 23:17:59.051192 kernel: Spectre V2 : Mitigation: Retpolines Feb 8 23:17:59.051202 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 8 23:17:59.051212 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 8 23:17:59.051220 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 8 23:17:59.051228 kernel: RETBleed: Vulnerable Feb 8 23:17:59.051238 kernel: Speculative Store Bypass: Vulnerable Feb 8 23:17:59.051247 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 8 23:17:59.051254 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 8 23:17:59.051262 kernel: GDS: Unknown: Dependent on hypervisor status Feb 8 23:17:59.051269 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 8 23:17:59.051280 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 8 23:17:59.051287 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 8 23:17:59.051296 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 8 23:17:59.051304 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 8 23:17:59.051314 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 8 23:17:59.051321 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 8 23:17:59.051328 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 8 23:17:59.051337 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 8 23:17:59.051345 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 8 23:17:59.051352 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 8 23:17:59.051359 kernel: Freeing SMP alternatives memory: 32K Feb 8 23:17:59.051366 kernel: pid_max: default: 32768 minimum: 301 Feb 8 23:17:59.051373 kernel: LSM: Security Framework initializing Feb 8 23:17:59.051382 kernel: SELinux: Initializing. Feb 8 23:17:59.051392 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 8 23:17:59.051400 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 8 23:17:59.051409 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 8 23:17:59.051418 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 8 23:17:59.051428 kernel: signal: max sigframe size: 3632 Feb 8 23:17:59.051436 kernel: rcu: Hierarchical SRCU implementation. Feb 8 23:17:59.051446 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 8 23:17:59.051453 kernel: smp: Bringing up secondary CPUs ... Feb 8 23:17:59.051463 kernel: x86: Booting SMP configuration: Feb 8 23:17:59.051471 kernel: .... node #0, CPUs: #1 Feb 8 23:17:59.051483 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 8 23:17:59.051492 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 8 23:17:59.051506 kernel: smp: Brought up 1 node, 2 CPUs Feb 8 23:17:59.051514 kernel: smpboot: Max logical packages: 1 Feb 8 23:17:59.051522 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 8 23:17:59.051529 kernel: devtmpfs: initialized Feb 8 23:17:59.051537 kernel: x86/mm: Memory block size: 128MB Feb 8 23:17:59.051544 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 8 23:17:59.051556 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 8 23:17:59.051564 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 8 23:17:59.051571 kernel: pinctrl core: initialized pinctrl subsystem Feb 8 23:17:59.051580 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 8 23:17:59.051589 kernel: audit: initializing netlink subsys (disabled) Feb 8 23:17:59.051596 kernel: audit: type=2000 audit(1707434278.023:1): state=initialized audit_enabled=0 res=1 Feb 8 23:17:59.051604 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 8 23:17:59.051613 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 8 23:17:59.051620 kernel: cpuidle: using governor menu Feb 8 23:17:59.051632 kernel: ACPI: bus type PCI registered Feb 8 23:17:59.051640 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 8 23:17:59.051650 kernel: dca service started, version 1.12.1 Feb 8 23:17:59.051658 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 8 23:17:59.051667 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 8 23:17:59.051675 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 8 23:17:59.051683 kernel: ACPI: Added _OSI(Module Device) Feb 8 23:17:59.051693 kernel: ACPI: Added _OSI(Processor Device) Feb 8 23:17:59.051701 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 8 23:17:59.051713 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 8 23:17:59.051721 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 8 23:17:59.051731 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 8 23:17:59.051741 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 8 23:17:59.051749 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 8 23:17:59.051758 kernel: ACPI: Interpreter enabled Feb 8 23:17:59.051769 kernel: ACPI: PM: (supports S0 S5) Feb 8 23:17:59.051776 kernel: ACPI: Using IOAPIC for interrupt routing Feb 8 23:17:59.051785 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 8 23:17:59.051796 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 8 23:17:59.051805 kernel: iommu: Default domain type: Translated Feb 8 23:17:59.051814 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 8 23:17:59.051821 kernel: vgaarb: loaded Feb 8 23:17:59.051831 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 8 23:17:59.051838 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 8 23:17:59.051849 kernel: PTP clock support registered Feb 8 23:17:59.051856 kernel: Registered efivars operations Feb 8 23:17:59.051865 kernel: PCI: Using ACPI for IRQ routing Feb 8 23:17:59.051874 kernel: PCI: System does not support PCI Feb 8 23:17:59.051884 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 8 23:17:59.051893 kernel: VFS: Disk quotas dquot_6.6.0 Feb 8 23:17:59.051901 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 8 23:17:59.051911 kernel: pnp: PnP ACPI init Feb 8 23:17:59.051918 kernel: pnp: PnP ACPI: found 3 devices Feb 8 23:17:59.051928 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 8 23:17:59.051936 kernel: NET: Registered PF_INET protocol family Feb 8 23:17:59.051945 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 8 23:17:59.051956 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 8 23:17:59.051965 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 8 23:17:59.051974 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 8 23:17:59.051981 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 8 23:17:59.051991 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 8 23:17:59.051999 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 8 23:17:59.052008 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 8 23:17:59.052016 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 8 23:17:59.052024 kernel: NET: Registered PF_XDP protocol family Feb 8 23:17:59.052036 kernel: PCI: CLS 0 bytes, default 64 Feb 8 23:17:59.052043 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 8 23:17:59.052053 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 8 23:17:59.052061 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 8 23:17:59.052071 kernel: Initialise system trusted keyrings Feb 8 23:17:59.052079 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 8 23:17:59.052089 kernel: Key type asymmetric registered Feb 8 23:17:59.052098 kernel: Asymmetric key parser 'x509' registered Feb 8 23:17:59.052107 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 8 23:17:59.052127 kernel: io scheduler mq-deadline registered Feb 8 23:17:59.052138 kernel: io scheduler kyber registered Feb 8 23:17:59.052145 kernel: io scheduler bfq registered Feb 8 23:17:59.052155 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 8 23:17:59.052163 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 8 23:17:59.052170 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 8 23:17:59.052178 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 8 23:17:59.052188 kernel: i8042: PNP: No PS/2 controller found. Feb 8 23:17:59.052322 kernel: rtc_cmos 00:02: registered as rtc0 Feb 8 23:17:59.052411 kernel: rtc_cmos 00:02: setting system clock to 2024-02-08T23:17:58 UTC (1707434278) Feb 8 23:17:59.052490 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 8 23:17:59.052502 kernel: fail to initialize ptp_kvm Feb 8 23:17:59.052512 kernel: intel_pstate: CPU model not supported Feb 8 23:17:59.052522 kernel: efifb: probing for efifb Feb 8 23:17:59.052530 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 8 23:17:59.052538 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 8 23:17:59.052545 kernel: efifb: scrolling: redraw Feb 8 23:17:59.052557 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 8 23:17:59.052565 kernel: Console: switching to colour frame buffer device 128x48 Feb 8 23:17:59.052575 kernel: fb0: EFI VGA frame buffer device Feb 8 23:17:59.052583 kernel: pstore: Registered efi as persistent store backend Feb 8 23:17:59.052590 kernel: NET: Registered PF_INET6 protocol family Feb 8 23:17:59.052597 kernel: Segment Routing with IPv6 Feb 8 23:17:59.052604 kernel: In-situ OAM (IOAM) with IPv6 Feb 8 23:17:59.052614 kernel: NET: Registered PF_PACKET protocol family Feb 8 23:17:59.052623 kernel: Key type dns_resolver registered Feb 8 23:17:59.052632 kernel: IPI shorthand broadcast: enabled Feb 8 23:17:59.052639 kernel: sched_clock: Marking stable (779569100, 26700900)->(1013703700, -207433700) Feb 8 23:17:59.052646 kernel: registered taskstats version 1 Feb 8 23:17:59.052655 kernel: Loading compiled-in X.509 certificates Feb 8 23:17:59.052664 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 8 23:17:59.052671 kernel: Key type .fscrypt registered Feb 8 23:17:59.052678 kernel: Key type fscrypt-provisioning registered Feb 8 23:17:59.052688 kernel: pstore: Using crash dump compression: deflate Feb 8 23:17:59.052698 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 8 23:17:59.052706 kernel: ima: Allocated hash algorithm: sha1 Feb 8 23:17:59.052715 kernel: ima: No architecture policies found Feb 8 23:17:59.052723 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 8 23:17:59.052730 kernel: Write protecting the kernel read-only data: 28672k Feb 8 23:17:59.052741 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 8 23:17:59.052748 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 8 23:17:59.052759 kernel: Run /init as init process Feb 8 23:17:59.052766 kernel: with arguments: Feb 8 23:17:59.052776 kernel: /init Feb 8 23:17:59.052786 kernel: with environment: Feb 8 23:17:59.052793 kernel: HOME=/ Feb 8 23:17:59.052799 kernel: TERM=linux Feb 8 23:17:59.052806 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 8 23:17:59.052818 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:17:59.052828 systemd[1]: Detected virtualization microsoft. Feb 8 23:17:59.052839 systemd[1]: Detected architecture x86-64. Feb 8 23:17:59.052849 systemd[1]: Running in initrd. Feb 8 23:17:59.052859 systemd[1]: No hostname configured, using default hostname. Feb 8 23:17:59.052867 systemd[1]: Hostname set to . Feb 8 23:17:59.052877 systemd[1]: Initializing machine ID from random generator. Feb 8 23:17:59.052885 systemd[1]: Queued start job for default target initrd.target. Feb 8 23:17:59.052894 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:17:59.052904 systemd[1]: Reached target cryptsetup.target. Feb 8 23:17:59.052912 systemd[1]: Reached target paths.target. Feb 8 23:17:59.052922 systemd[1]: Reached target slices.target. Feb 8 23:17:59.052932 systemd[1]: Reached target swap.target. Feb 8 23:17:59.052942 systemd[1]: Reached target timers.target. Feb 8 23:17:59.052950 systemd[1]: Listening on iscsid.socket. Feb 8 23:17:59.052962 systemd[1]: Listening on iscsiuio.socket. Feb 8 23:17:59.052971 systemd[1]: Listening on systemd-journald-audit.socket. Feb 8 23:17:59.052980 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 8 23:17:59.052990 systemd[1]: Listening on systemd-journald.socket. Feb 8 23:17:59.053002 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:17:59.053012 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:17:59.053021 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:17:59.053030 systemd[1]: Reached target sockets.target. Feb 8 23:17:59.053040 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:17:59.053047 systemd[1]: Finished network-cleanup.service. Feb 8 23:17:59.053058 systemd[1]: Starting systemd-fsck-usr.service... Feb 8 23:17:59.053067 systemd[1]: Starting systemd-journald.service... Feb 8 23:17:59.053074 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:17:59.053085 systemd[1]: Starting systemd-resolved.service... Feb 8 23:17:59.053095 systemd[1]: Starting systemd-vconsole-setup.service... Feb 8 23:17:59.053103 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:17:59.053129 systemd-journald[183]: Journal started Feb 8 23:17:59.053181 systemd-journald[183]: Runtime Journal (/run/log/journal/c529b84cf77e466e96fa1a34658f46ec) is 8.0M, max 159.0M, 151.0M free. Feb 8 23:17:59.030489 systemd-modules-load[184]: Inserted module 'overlay' Feb 8 23:17:59.076774 kernel: audit: type=1130 audit(1707434279.057:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.076804 systemd[1]: Started systemd-journald.service. Feb 8 23:17:59.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.087137 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 8 23:17:59.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.089307 systemd[1]: Finished systemd-fsck-usr.service. Feb 8 23:17:59.109537 kernel: Bridge firewalling registered Feb 8 23:17:59.109557 kernel: audit: type=1130 audit(1707434279.088:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.108561 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 8 23:17:59.115345 systemd[1]: Finished systemd-vconsole-setup.service. Feb 8 23:17:59.121253 systemd[1]: Starting dracut-cmdline-ask.service... Feb 8 23:17:59.126203 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:17:59.141047 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:17:59.155845 systemd[1]: Finished dracut-cmdline-ask.service. Feb 8 23:17:59.189876 kernel: audit: type=1130 audit(1707434279.114:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.189907 kernel: SCSI subsystem initialized Feb 8 23:17:59.189923 kernel: audit: type=1130 audit(1707434279.120:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.159895 systemd[1]: Starting dracut-cmdline.service... Feb 8 23:17:59.174308 systemd-resolved[185]: Positive Trust Anchors: Feb 8 23:17:59.207357 kernel: audit: type=1130 audit(1707434279.140:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.174316 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:17:59.222664 kernel: audit: type=1130 audit(1707434279.157:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.222763 dracut-cmdline[200]: dracut-dracut-053 Feb 8 23:17:59.233307 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 8 23:17:59.174345 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:17:59.258930 kernel: device-mapper: uevent: version 1.0.3 Feb 8 23:17:59.258954 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 8 23:17:59.258971 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:17:59.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.177408 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 8 23:17:59.287360 kernel: audit: type=1130 audit(1707434279.237:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.236880 systemd[1]: Started systemd-resolved.service. Feb 8 23:17:59.238759 systemd[1]: Reached target nss-lookup.target. Feb 8 23:17:59.291740 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 8 23:17:59.294710 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:17:59.300180 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:17:59.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.322138 kernel: audit: type=1130 audit(1707434279.299:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.327705 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:17:59.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.345129 kernel: audit: type=1130 audit(1707434279.329:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.353128 kernel: Loading iSCSI transport class v2.0-870. Feb 8 23:17:59.367139 kernel: iscsi: registered transport (tcp) Feb 8 23:17:59.391032 kernel: iscsi: registered transport (qla4xxx) Feb 8 23:17:59.391068 kernel: QLogic iSCSI HBA Driver Feb 8 23:17:59.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.419106 systemd[1]: Finished dracut-cmdline.service. Feb 8 23:17:59.422713 systemd[1]: Starting dracut-pre-udev.service... Feb 8 23:17:59.473135 kernel: raid6: avx512x4 gen() 18565 MB/s Feb 8 23:17:59.493133 kernel: raid6: avx512x4 xor() 7522 MB/s Feb 8 23:17:59.513127 kernel: raid6: avx512x2 gen() 18747 MB/s Feb 8 23:17:59.534128 kernel: raid6: avx512x2 xor() 29845 MB/s Feb 8 23:17:59.554122 kernel: raid6: avx512x1 gen() 18635 MB/s Feb 8 23:17:59.574124 kernel: raid6: avx512x1 xor() 26843 MB/s Feb 8 23:17:59.594126 kernel: raid6: avx2x4 gen() 18648 MB/s Feb 8 23:17:59.613129 kernel: raid6: avx2x4 xor() 7239 MB/s Feb 8 23:17:59.633125 kernel: raid6: avx2x2 gen() 18628 MB/s Feb 8 23:17:59.653132 kernel: raid6: avx2x2 xor() 22300 MB/s Feb 8 23:17:59.673138 kernel: raid6: avx2x1 gen() 13914 MB/s Feb 8 23:17:59.693127 kernel: raid6: avx2x1 xor() 19736 MB/s Feb 8 23:17:59.714127 kernel: raid6: sse2x4 gen() 11709 MB/s Feb 8 23:17:59.734123 kernel: raid6: sse2x4 xor() 6499 MB/s Feb 8 23:17:59.754123 kernel: raid6: sse2x2 gen() 12981 MB/s Feb 8 23:17:59.775125 kernel: raid6: sse2x2 xor() 7489 MB/s Feb 8 23:17:59.794122 kernel: raid6: sse2x1 gen() 11667 MB/s Feb 8 23:17:59.817169 kernel: raid6: sse2x1 xor() 5923 MB/s Feb 8 23:17:59.817185 kernel: raid6: using algorithm avx512x2 gen() 18747 MB/s Feb 8 23:17:59.817197 kernel: raid6: .... xor() 29845 MB/s, rmw enabled Feb 8 23:17:59.824447 kernel: raid6: using avx512x2 recovery algorithm Feb 8 23:17:59.840136 kernel: xor: automatically using best checksumming function avx Feb 8 23:17:59.936143 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 8 23:17:59.944512 systemd[1]: Finished dracut-pre-udev.service. Feb 8 23:17:59.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.948000 audit: BPF prog-id=7 op=LOAD Feb 8 23:17:59.948000 audit: BPF prog-id=8 op=LOAD Feb 8 23:17:59.949654 systemd[1]: Starting systemd-udevd.service... Feb 8 23:17:59.965207 systemd-udevd[382]: Using default interface naming scheme 'v252'. Feb 8 23:17:59.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:17:59.971996 systemd[1]: Started systemd-udevd.service. Feb 8 23:17:59.977442 systemd[1]: Starting dracut-pre-trigger.service... Feb 8 23:17:59.991452 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Feb 8 23:18:00.021975 systemd[1]: Finished dracut-pre-trigger.service. Feb 8 23:18:00.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:00.027524 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:18:00.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:00.059654 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:18:00.109134 kernel: cryptd: max_cpu_qlen set to 1000 Feb 8 23:18:00.133387 kernel: hv_vmbus: Vmbus version:5.2 Feb 8 23:18:00.147245 kernel: AVX2 version of gcm_enc/dec engaged. Feb 8 23:18:00.147289 kernel: AES CTR mode by8 optimization enabled Feb 8 23:18:00.161140 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 8 23:18:00.175317 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 8 23:18:00.175355 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 8 23:18:00.185130 kernel: hv_vmbus: registering driver hv_netvsc Feb 8 23:18:00.185166 kernel: hv_vmbus: registering driver hv_storvsc Feb 8 23:18:00.191464 kernel: hv_vmbus: registering driver hid_hyperv Feb 8 23:18:00.198815 kernel: scsi host1: storvsc_host_t Feb 8 23:18:00.199053 kernel: scsi host0: storvsc_host_t Feb 8 23:18:00.211994 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 8 23:18:00.212059 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 8 23:18:00.212076 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 8 23:18:00.223503 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 8 23:18:00.252962 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 8 23:18:00.253160 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 8 23:18:00.255133 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 8 23:18:00.264632 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 8 23:18:00.264842 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 8 23:18:00.274861 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 8 23:18:00.275050 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 8 23:18:00.275229 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 8 23:18:00.289085 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:18:00.289130 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 8 23:18:00.365741 kernel: hv_netvsc 000d3a69-6065-000d-3a69-6065000d3a69 eth0: VF slot 1 added Feb 8 23:18:00.375129 kernel: hv_vmbus: registering driver hv_pci Feb 8 23:18:00.383733 kernel: hv_pci 13d9e6d8-4cae-44f3-a63e-27f95ede63e9: PCI VMBus probing: Using version 0x10004 Feb 8 23:18:00.383907 kernel: hv_pci 13d9e6d8-4cae-44f3-a63e-27f95ede63e9: PCI host bridge to bus 4cae:00 Feb 8 23:18:00.393057 kernel: pci_bus 4cae:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 8 23:18:00.393224 kernel: pci_bus 4cae:00: No busn resource found for root bus, will use [bus 00-ff] Feb 8 23:18:00.403567 kernel: pci 4cae:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 8 23:18:00.413631 kernel: pci 4cae:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 8 23:18:00.433362 kernel: pci 4cae:00:02.0: enabling Extended Tags Feb 8 23:18:00.446451 kernel: pci 4cae:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 4cae:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 8 23:18:00.455645 kernel: pci_bus 4cae:00: busn_res: [bus 00-ff] end is updated to 00 Feb 8 23:18:00.455799 kernel: pci 4cae:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 8 23:18:00.549144 kernel: mlx5_core 4cae:00:02.0: firmware version: 14.30.1350 Feb 8 23:18:00.694077 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 8 23:18:00.720139 kernel: mlx5_core 4cae:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 8 23:18:00.727132 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) Feb 8 23:18:00.740745 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:18:00.876461 kernel: mlx5_core 4cae:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 8 23:18:00.876719 kernel: mlx5_core 4cae:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Feb 8 23:18:00.889099 kernel: hv_netvsc 000d3a69-6065-000d-3a69-6065000d3a69 eth0: VF registering: eth1 Feb 8 23:18:00.889310 kernel: mlx5_core 4cae:00:02.0 eth1: joined to eth0 Feb 8 23:18:00.897901 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 8 23:18:00.903347 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 8 23:18:00.915303 kernel: mlx5_core 4cae:00:02.0 enP19630s1: renamed from eth1 Feb 8 23:18:00.909820 systemd[1]: Starting disk-uuid.service... Feb 8 23:18:00.954661 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 8 23:18:01.937141 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 8 23:18:01.937567 disk-uuid[562]: The operation has completed successfully. Feb 8 23:18:02.006628 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 8 23:18:02.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.006735 systemd[1]: Finished disk-uuid.service. Feb 8 23:18:02.018744 systemd[1]: Starting verity-setup.service... Feb 8 23:18:02.055182 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 8 23:18:02.352504 systemd[1]: Found device dev-mapper-usr.device. Feb 8 23:18:02.358965 systemd[1]: Mounting sysusr-usr.mount... Feb 8 23:18:02.362927 systemd[1]: Finished verity-setup.service. Feb 8 23:18:02.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.438129 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 8 23:18:02.438481 systemd[1]: Mounted sysusr-usr.mount. Feb 8 23:18:02.440690 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 8 23:18:02.441479 systemd[1]: Starting ignition-setup.service... Feb 8 23:18:02.451102 systemd[1]: Starting parse-ip-for-networkd.service... Feb 8 23:18:02.476416 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:18:02.476454 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:18:02.476473 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:18:02.521754 systemd[1]: Finished parse-ip-for-networkd.service. Feb 8 23:18:02.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.526000 audit: BPF prog-id=9 op=LOAD Feb 8 23:18:02.527257 systemd[1]: Starting systemd-networkd.service... Feb 8 23:18:02.554855 systemd-networkd[832]: lo: Link UP Feb 8 23:18:02.554865 systemd-networkd[832]: lo: Gained carrier Feb 8 23:18:02.562556 systemd-networkd[832]: Enumeration completed Feb 8 23:18:02.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.563009 systemd[1]: Started systemd-networkd.service. Feb 8 23:18:02.564461 systemd-networkd[832]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:18:02.565923 systemd[1]: Reached target network.target. Feb 8 23:18:02.571476 systemd[1]: Starting iscsiuio.service... Feb 8 23:18:02.582001 systemd[1]: Started iscsiuio.service. Feb 8 23:18:02.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.587497 systemd[1]: Starting iscsid.service... Feb 8 23:18:02.593345 iscsid[843]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:18:02.593345 iscsid[843]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 8 23:18:02.593345 iscsid[843]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 8 23:18:02.593345 iscsid[843]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 8 23:18:02.593345 iscsid[843]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:18:02.593345 iscsid[843]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 8 23:18:02.615293 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 8 23:18:02.626611 systemd[1]: Started iscsid.service. Feb 8 23:18:02.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.629226 systemd[1]: Starting dracut-initqueue.service... Feb 8 23:18:02.637338 kernel: mlx5_core 4cae:00:02.0 enP19630s1: Link up Feb 8 23:18:02.645419 systemd[1]: Finished dracut-initqueue.service. Feb 8 23:18:02.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.649810 systemd[1]: Reached target remote-fs-pre.target. Feb 8 23:18:02.654451 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:18:02.659244 systemd[1]: Reached target remote-fs.target. Feb 8 23:18:02.663853 systemd[1]: Starting dracut-pre-mount.service... Feb 8 23:18:02.671766 systemd[1]: Finished dracut-pre-mount.service. Feb 8 23:18:02.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.711146 kernel: hv_netvsc 000d3a69-6065-000d-3a69-6065000d3a69 eth0: Data path switched to VF: enP19630s1 Feb 8 23:18:02.716133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:18:02.716403 systemd-networkd[832]: enP19630s1: Link UP Feb 8 23:18:02.716540 systemd-networkd[832]: eth0: Link UP Feb 8 23:18:02.716743 systemd-networkd[832]: eth0: Gained carrier Feb 8 23:18:02.722584 systemd-networkd[832]: enP19630s1: Gained carrier Feb 8 23:18:02.752192 systemd-networkd[832]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:18:02.789254 systemd[1]: Finished ignition-setup.service. Feb 8 23:18:02.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:02.794390 systemd[1]: Starting ignition-fetch-offline.service... Feb 8 23:18:04.051336 systemd-networkd[832]: eth0: Gained IPv6LL Feb 8 23:18:06.574807 ignition[859]: Ignition 2.14.0 Feb 8 23:18:06.574826 ignition[859]: Stage: fetch-offline Feb 8 23:18:06.574930 ignition[859]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:06.574981 ignition[859]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:06.671708 ignition[859]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:06.671881 ignition[859]: parsed url from cmdline: "" Feb 8 23:18:06.671886 ignition[859]: no config URL provided Feb 8 23:18:06.671891 ignition[859]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:18:06.671899 ignition[859]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:18:06.671905 ignition[859]: failed to fetch config: resource requires networking Feb 8 23:18:06.674772 ignition[859]: Ignition finished successfully Feb 8 23:18:06.686764 systemd[1]: Finished ignition-fetch-offline.service. Feb 8 23:18:06.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.690252 systemd[1]: Starting ignition-fetch.service... Feb 8 23:18:06.711544 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 8 23:18:06.711575 kernel: audit: type=1130 audit(1707434286.689:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.714862 ignition[865]: Ignition 2.14.0 Feb 8 23:18:06.714871 ignition[865]: Stage: fetch Feb 8 23:18:06.714993 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:06.715027 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:06.724615 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:06.724780 ignition[865]: parsed url from cmdline: "" Feb 8 23:18:06.724786 ignition[865]: no config URL provided Feb 8 23:18:06.724794 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:18:06.724803 ignition[865]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:18:06.724832 ignition[865]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 8 23:18:06.812422 ignition[865]: GET result: OK Feb 8 23:18:06.812563 ignition[865]: config has been read from IMDS userdata Feb 8 23:18:06.812594 ignition[865]: parsing config with SHA512: c468eebefecea54af541a2b06fe8cf4498ed088b98ecacd698937ac28475ddd7345e1f31571a5fb75bc40f5471f168ce061cfe66626f45002d0b9c4bd5129c0c Feb 8 23:18:06.843862 unknown[865]: fetched base config from "system" Feb 8 23:18:06.843875 unknown[865]: fetched base config from "system" Feb 8 23:18:06.844539 ignition[865]: fetch: fetch complete Feb 8 23:18:06.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.843882 unknown[865]: fetched user config from "azure" Feb 8 23:18:06.871954 kernel: audit: type=1130 audit(1707434286.850:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.844545 ignition[865]: fetch: fetch passed Feb 8 23:18:06.848531 systemd[1]: Finished ignition-fetch.service. Feb 8 23:18:06.844588 ignition[865]: Ignition finished successfully Feb 8 23:18:06.851494 systemd[1]: Starting ignition-kargs.service... Feb 8 23:18:06.875925 ignition[871]: Ignition 2.14.0 Feb 8 23:18:06.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.882846 systemd[1]: Finished ignition-kargs.service. Feb 8 23:18:06.903543 kernel: audit: type=1130 audit(1707434286.884:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.875932 ignition[871]: Stage: kargs Feb 8 23:18:06.885813 systemd[1]: Starting ignition-disks.service... Feb 8 23:18:06.876087 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:06.876150 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:06.878727 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:06.881419 ignition[871]: kargs: kargs passed Feb 8 23:18:06.881479 ignition[871]: Ignition finished successfully Feb 8 23:18:06.920633 ignition[877]: Ignition 2.14.0 Feb 8 23:18:06.920643 ignition[877]: Stage: disks Feb 8 23:18:06.920779 ignition[877]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:06.920812 ignition[877]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:06.931164 ignition[877]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:06.932447 ignition[877]: disks: disks passed Feb 8 23:18:06.949619 kernel: audit: type=1130 audit(1707434286.935:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:06.933786 systemd[1]: Finished ignition-disks.service. Feb 8 23:18:06.932486 ignition[877]: Ignition finished successfully Feb 8 23:18:06.936104 systemd[1]: Reached target initrd-root-device.target. Feb 8 23:18:06.949631 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:18:06.951823 systemd[1]: Reached target local-fs.target. Feb 8 23:18:06.959996 systemd[1]: Reached target sysinit.target. Feb 8 23:18:06.963345 systemd[1]: Reached target basic.target. Feb 8 23:18:06.966042 systemd[1]: Starting systemd-fsck-root.service... Feb 8 23:18:07.030855 systemd-fsck[885]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 8 23:18:07.036716 systemd[1]: Finished systemd-fsck-root.service. Feb 8 23:18:07.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.042396 systemd[1]: Mounting sysroot.mount... Feb 8 23:18:07.058473 kernel: audit: type=1130 audit(1707434287.041:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.070996 systemd[1]: Mounted sysroot.mount. Feb 8 23:18:07.074361 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 8 23:18:07.074427 systemd[1]: Reached target initrd-root-fs.target. Feb 8 23:18:07.114179 systemd[1]: Mounting sysroot-usr.mount... Feb 8 23:18:07.120512 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 8 23:18:07.125160 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 8 23:18:07.125197 systemd[1]: Reached target ignition-diskful.target. Feb 8 23:18:07.134999 systemd[1]: Mounted sysroot-usr.mount. Feb 8 23:18:07.196287 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:18:07.202630 systemd[1]: Starting initrd-setup-root.service... Feb 8 23:18:07.214175 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (896) Feb 8 23:18:07.222793 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:18:07.222826 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:18:07.222839 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:18:07.231680 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:18:07.240072 initrd-setup-root[901]: cut: /sysroot/etc/passwd: No such file or directory Feb 8 23:18:07.262099 initrd-setup-root[927]: cut: /sysroot/etc/group: No such file or directory Feb 8 23:18:07.268314 initrd-setup-root[935]: cut: /sysroot/etc/shadow: No such file or directory Feb 8 23:18:07.290488 initrd-setup-root[943]: cut: /sysroot/etc/gshadow: No such file or directory Feb 8 23:18:07.833048 systemd[1]: Finished initrd-setup-root.service. Feb 8 23:18:07.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.849754 systemd[1]: Starting ignition-mount.service... Feb 8 23:18:07.853068 kernel: audit: type=1130 audit(1707434287.835:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.857559 systemd[1]: Starting sysroot-boot.service... Feb 8 23:18:07.862314 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 8 23:18:07.864950 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 8 23:18:07.880087 ignition[962]: INFO : Ignition 2.14.0 Feb 8 23:18:07.880087 ignition[962]: INFO : Stage: mount Feb 8 23:18:07.884850 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:07.884850 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:07.884850 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:07.897434 ignition[962]: INFO : mount: mount passed Feb 8 23:18:07.897434 ignition[962]: INFO : Ignition finished successfully Feb 8 23:18:07.902506 systemd[1]: Finished sysroot-boot.service. Feb 8 23:18:07.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.916568 systemd[1]: Finished ignition-mount.service. Feb 8 23:18:07.929901 kernel: audit: type=1130 audit(1707434287.904:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.929935 kernel: audit: type=1130 audit(1707434287.918:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:07.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:08.833296 coreos-metadata[895]: Feb 08 23:18:08.832 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 8 23:18:08.852932 coreos-metadata[895]: Feb 08 23:18:08.852 INFO Fetch successful Feb 8 23:18:08.885397 coreos-metadata[895]: Feb 08 23:18:08.885 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 8 23:18:08.903633 coreos-metadata[895]: Feb 08 23:18:08.903 INFO Fetch successful Feb 8 23:18:08.932288 coreos-metadata[895]: Feb 08 23:18:08.932 INFO wrote hostname ci-3510.3.2-a-a74a3a29e1 to /sysroot/etc/hostname Feb 8 23:18:08.938175 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 8 23:18:08.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:08.941763 systemd[1]: Starting ignition-files.service... Feb 8 23:18:08.959213 kernel: audit: type=1130 audit(1707434288.938:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:18:08.965240 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:18:08.983135 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (974) Feb 8 23:18:08.983171 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:18:08.991605 kernel: BTRFS info (device sda6): using free space tree Feb 8 23:18:08.991627 kernel: BTRFS info (device sda6): has skinny extents Feb 8 23:18:09.000460 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:18:09.014618 ignition[993]: INFO : Ignition 2.14.0 Feb 8 23:18:09.016613 ignition[993]: INFO : Stage: files Feb 8 23:18:09.016613 ignition[993]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:18:09.016613 ignition[993]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:18:09.027759 ignition[993]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:18:09.049499 ignition[993]: DEBUG : files: compiled without relabeling support, skipping Feb 8 23:18:09.052699 ignition[993]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 8 23:18:09.056206 ignition[993]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 8 23:18:09.144320 ignition[993]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 8 23:18:09.148437 ignition[993]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 8 23:18:09.169432 unknown[993]: wrote ssh authorized keys file for user: core Feb 8 23:18:09.172434 ignition[993]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 8 23:18:09.191983 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:18:09.197332 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 8 23:18:09.884483 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 8 23:18:10.017750 ignition[993]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 8 23:18:10.025806 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:18:10.025806 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 8 23:18:10.025806 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 8 23:18:10.348652 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 8 23:18:10.480738 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 8 23:18:10.485945 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:18:10.485945 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 8 23:18:10.983336 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 8 23:18:11.165124 ignition[993]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 8 23:18:11.173372 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:18:11.173372 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 8 23:18:11.182315 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 8 23:18:11.978949 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 8 23:18:31.125071 ignition[993]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 8 23:18:31.134803 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 8 23:18:31.134803 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:18:31.134803 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 8 23:18:31.830402 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 8 23:18:54.049778 ignition[993]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 8 23:18:54.059232 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:18:54.059232 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:18:54.059232 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 8 23:18:54.797084 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 8 23:19:47.011660 ignition[993]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 8 23:19:47.019957 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 8 23:19:47.138618 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (995) Feb 8 23:19:47.138643 kernel: audit: type=1130 audit(1707434387.078:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.138655 kernel: audit: type=1130 audit(1707434387.111:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.138666 kernel: audit: type=1131 audit(1707434387.111:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2671804753" Feb 8 23:19:47.138762 ignition[993]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2671804753": device or resource busy Feb 8 23:19:47.138762 ignition[993]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2671804753", trying btrfs: device or resource busy Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2671804753" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2671804753" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2671804753" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2671804753" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516893106" Feb 8 23:19:47.138762 ignition[993]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516893106": device or resource busy Feb 8 23:19:47.138762 ignition[993]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3516893106", trying btrfs: device or resource busy Feb 8 23:19:47.138762 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516893106" Feb 8 23:19:47.227549 kernel: audit: type=1130 audit(1707434387.202:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.041716 systemd[1]: mnt-oem2671804753.mount: Deactivated successfully. Feb 8 23:19:47.230087 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516893106" Feb 8 23:19:47.230087 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3516893106" Feb 8 23:19:47.230087 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3516893106" Feb 8 23:19:47.230087 ignition[993]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 8 23:19:47.230087 ignition[993]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 8 23:19:47.061487 systemd[1]: mnt-oem3516893106.mount: Deactivated successfully. Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Feb 8 23:19:47.313323 ignition[993]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:19:47.313323 ignition[993]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:19:47.313323 ignition[993]: INFO : files: files passed Feb 8 23:19:47.313323 ignition[993]: INFO : Ignition finished successfully Feb 8 23:19:47.398128 kernel: audit: type=1130 audit(1707434387.349:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.398153 kernel: audit: type=1131 audit(1707434387.349:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.398258 initrd-setup-root-after-ignition[1018]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 8 23:19:47.075885 systemd[1]: Finished ignition-files.service. Feb 8 23:19:47.092423 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 8 23:19:47.100039 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 8 23:19:47.100738 systemd[1]: Starting ignition-quench.service... Feb 8 23:19:47.104188 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 8 23:19:47.104273 systemd[1]: Finished ignition-quench.service. Feb 8 23:19:47.189228 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 8 23:19:47.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.202377 systemd[1]: Reached target ignition-complete.target. Feb 8 23:19:47.438750 kernel: audit: type=1130 audit(1707434387.423:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.287641 systemd[1]: Starting initrd-parse-etc.service... Feb 8 23:19:47.345871 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 8 23:19:47.345960 systemd[1]: Finished initrd-parse-etc.service. Feb 8 23:19:47.349771 systemd[1]: Reached target initrd-fs.target. Feb 8 23:19:47.375186 systemd[1]: Reached target initrd.target. Feb 8 23:19:47.380096 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 8 23:19:47.380895 systemd[1]: Starting dracut-pre-pivot.service... Feb 8 23:19:47.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.419850 systemd[1]: Finished dracut-pre-pivot.service. Feb 8 23:19:47.481404 kernel: audit: type=1131 audit(1707434387.465:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.441217 systemd[1]: Starting initrd-cleanup.service... Feb 8 23:19:47.448923 systemd[1]: Stopped target nss-lookup.target. Feb 8 23:19:47.452226 systemd[1]: Stopped target remote-cryptsetup.target. Feb 8 23:19:47.456496 systemd[1]: Stopped target timers.target. Feb 8 23:19:47.461587 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 8 23:19:47.461720 systemd[1]: Stopped dracut-pre-pivot.service. Feb 8 23:19:47.465873 systemd[1]: Stopped target initrd.target. Feb 8 23:19:47.481549 systemd[1]: Stopped target basic.target. Feb 8 23:19:47.485256 systemd[1]: Stopped target ignition-complete.target. Feb 8 23:19:47.487783 systemd[1]: Stopped target ignition-diskful.target. Feb 8 23:19:47.491924 systemd[1]: Stopped target initrd-root-device.target. Feb 8 23:19:47.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.496343 systemd[1]: Stopped target remote-fs.target. Feb 8 23:19:47.542179 kernel: audit: type=1131 audit(1707434387.525:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.500366 systemd[1]: Stopped target remote-fs-pre.target. Feb 8 23:19:47.505227 systemd[1]: Stopped target sysinit.target. Feb 8 23:19:47.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.509218 systemd[1]: Stopped target local-fs.target. Feb 8 23:19:47.564458 kernel: audit: type=1131 audit(1707434387.546:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.513069 systemd[1]: Stopped target local-fs-pre.target. Feb 8 23:19:47.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.516856 systemd[1]: Stopped target swap.target. Feb 8 23:19:47.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.521168 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 8 23:19:47.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.521313 systemd[1]: Stopped dracut-pre-mount.service. Feb 8 23:19:47.537185 systemd[1]: Stopped target cryptsetup.target. Feb 8 23:19:47.542135 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 8 23:19:47.542306 systemd[1]: Stopped dracut-initqueue.service. Feb 8 23:19:47.559208 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 8 23:19:47.588994 iscsid[843]: iscsid shutting down. Feb 8 23:19:47.559367 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 8 23:19:47.594968 ignition[1031]: INFO : Ignition 2.14.0 Feb 8 23:19:47.594968 ignition[1031]: INFO : Stage: umount Feb 8 23:19:47.594968 ignition[1031]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:19:47.594968 ignition[1031]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 8 23:19:47.594968 ignition[1031]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 8 23:19:47.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.564533 systemd[1]: ignition-files.service: Deactivated successfully. Feb 8 23:19:47.622660 ignition[1031]: INFO : umount: umount passed Feb 8 23:19:47.622660 ignition[1031]: INFO : Ignition finished successfully Feb 8 23:19:47.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.564672 systemd[1]: Stopped ignition-files.service. Feb 8 23:19:47.568834 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 8 23:19:47.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.568962 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 8 23:19:47.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.573981 systemd[1]: Stopping ignition-mount.service... Feb 8 23:19:47.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.586328 systemd[1]: Stopping iscsid.service... Feb 8 23:19:47.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.595932 systemd[1]: Stopping sysroot-boot.service... Feb 8 23:19:47.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.606550 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 8 23:19:47.606718 systemd[1]: Stopped systemd-udev-trigger.service. Feb 8 23:19:47.609309 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 8 23:19:47.609446 systemd[1]: Stopped dracut-pre-trigger.service. Feb 8 23:19:47.627581 systemd[1]: iscsid.service: Deactivated successfully. Feb 8 23:19:47.627794 systemd[1]: Stopped iscsid.service. Feb 8 23:19:47.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.631269 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 8 23:19:47.631357 systemd[1]: Stopped ignition-mount.service. Feb 8 23:19:47.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.636564 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 8 23:19:47.636650 systemd[1]: Finished initrd-cleanup.service. Feb 8 23:19:47.640628 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 8 23:19:47.640671 systemd[1]: Stopped ignition-disks.service. Feb 8 23:19:47.643950 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 8 23:19:47.643998 systemd[1]: Stopped ignition-kargs.service. Feb 8 23:19:47.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.646205 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 8 23:19:47.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.716000 audit: BPF prog-id=6 op=UNLOAD Feb 8 23:19:47.646243 systemd[1]: Stopped ignition-fetch.service. Feb 8 23:19:47.649891 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 8 23:19:47.649937 systemd[1]: Stopped ignition-fetch-offline.service. Feb 8 23:19:47.652083 systemd[1]: Stopped target paths.target. Feb 8 23:19:47.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.655783 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 8 23:19:47.661170 systemd[1]: Stopped systemd-ask-password-console.path. Feb 8 23:19:47.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.667395 systemd[1]: Stopped target slices.target. Feb 8 23:19:47.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.669278 systemd[1]: Stopped target sockets.target. Feb 8 23:19:47.673475 systemd[1]: iscsid.socket: Deactivated successfully. Feb 8 23:19:47.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.673518 systemd[1]: Closed iscsid.socket. Feb 8 23:19:47.677444 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 8 23:19:47.677493 systemd[1]: Stopped ignition-setup.service. Feb 8 23:19:47.683235 systemd[1]: Stopping iscsiuio.service... Feb 8 23:19:47.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.685382 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 8 23:19:47.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.685478 systemd[1]: Stopped iscsiuio.service. Feb 8 23:19:47.689042 systemd[1]: Stopped target network.target. Feb 8 23:19:47.693552 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 8 23:19:47.693591 systemd[1]: Closed iscsiuio.socket. Feb 8 23:19:47.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.697338 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:19:47.700710 systemd[1]: Stopping systemd-resolved.service... Feb 8 23:19:47.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.709240 systemd-networkd[832]: eth0: DHCPv6 lease lost Feb 8 23:19:47.793000 audit: BPF prog-id=9 op=UNLOAD Feb 8 23:19:47.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.709362 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 8 23:19:47.709475 systemd[1]: Stopped systemd-resolved.service. Feb 8 23:19:47.712358 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:19:47.712448 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:19:47.717184 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 8 23:19:47.717218 systemd[1]: Closed systemd-networkd.socket. Feb 8 23:19:47.721588 systemd[1]: Stopping network-cleanup.service... Feb 8 23:19:47.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.727621 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 8 23:19:47.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.727681 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 8 23:19:47.731669 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 8 23:19:47.731721 systemd[1]: Stopped systemd-sysctl.service. Feb 8 23:19:47.738765 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 8 23:19:47.738814 systemd[1]: Stopped systemd-modules-load.service. Feb 8 23:19:47.839592 kernel: hv_netvsc 000d3a69-6065-000d-3a69-6065000d3a69 eth0: Data path switched from VF: enP19630s1 Feb 8 23:19:47.742957 systemd[1]: Stopping systemd-udevd.service... Feb 8 23:19:47.748002 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 8 23:19:47.748512 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 8 23:19:47.748644 systemd[1]: Stopped systemd-udevd.service. Feb 8 23:19:47.753266 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 8 23:19:47.753308 systemd[1]: Closed systemd-udevd-control.socket. Feb 8 23:19:47.758316 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 8 23:19:47.758353 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 8 23:19:47.761477 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 8 23:19:47.761520 systemd[1]: Stopped dracut-pre-udev.service. Feb 8 23:19:47.765386 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 8 23:19:47.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:47.765435 systemd[1]: Stopped dracut-cmdline.service. Feb 8 23:19:47.769783 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 8 23:19:47.769830 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 8 23:19:47.772738 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 8 23:19:47.782148 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 8 23:19:47.782207 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 8 23:19:47.784777 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 8 23:19:47.784825 systemd[1]: Stopped kmod-static-nodes.service. Feb 8 23:19:47.789549 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 8 23:19:47.789587 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 8 23:19:47.794202 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 8 23:19:47.794284 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 8 23:19:47.813694 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 8 23:19:47.813780 systemd[1]: Stopped sysroot-boot.service. Feb 8 23:19:47.916801 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Feb 8 23:19:47.816801 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 8 23:19:47.816851 systemd[1]: Stopped initrd-setup-root.service. Feb 8 23:19:47.862529 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 8 23:19:47.862622 systemd[1]: Stopped network-cleanup.service. Feb 8 23:19:47.866435 systemd[1]: Reached target initrd-switch-root.target. Feb 8 23:19:47.871969 systemd[1]: Starting initrd-switch-root.service... Feb 8 23:19:47.886164 systemd[1]: Switching root. Feb 8 23:19:47.921708 systemd-journald[183]: Journal stopped Feb 8 23:20:02.682203 kernel: SELinux: Class mctp_socket not defined in policy. Feb 8 23:20:02.682241 kernel: SELinux: Class anon_inode not defined in policy. Feb 8 23:20:02.682259 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 8 23:20:02.682272 kernel: SELinux: policy capability network_peer_controls=1 Feb 8 23:20:02.682288 kernel: SELinux: policy capability open_perms=1 Feb 8 23:20:02.682301 kernel: SELinux: policy capability extended_socket_class=1 Feb 8 23:20:02.682316 kernel: SELinux: policy capability always_check_network=0 Feb 8 23:20:02.682331 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 8 23:20:02.682345 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 8 23:20:02.682358 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 8 23:20:02.682372 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 8 23:20:02.682387 systemd[1]: Successfully loaded SELinux policy in 344.865ms. Feb 8 23:20:02.682404 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.485ms. Feb 8 23:20:02.682422 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:20:02.682441 systemd[1]: Detected virtualization microsoft. Feb 8 23:20:02.682455 systemd[1]: Detected architecture x86-64. Feb 8 23:20:02.682469 systemd[1]: Detected first boot. Feb 8 23:20:02.682484 systemd[1]: Hostname set to . Feb 8 23:20:02.682498 systemd[1]: Initializing machine ID from random generator. Feb 8 23:20:02.682515 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 8 23:20:02.682529 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 8 23:20:02.682544 kernel: audit: type=1400 audit(1707434392.857:90): avc: denied { associate } for pid=1064 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:20:02.682560 kernel: audit: type=1300 audit(1707434392.857:90): arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:02.682575 kernel: audit: type=1327 audit(1707434392.857:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:20:02.682592 kernel: audit: type=1400 audit(1707434392.864:91): avc: denied { associate } for pid=1064 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:20:02.682608 kernel: audit: type=1300 audit(1707434392.864:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248d9 a2=1ed a3=0 items=2 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:02.682622 kernel: audit: type=1307 audit(1707434392.864:91): cwd="/" Feb 8 23:20:02.682653 kernel: audit: type=1302 audit(1707434392.864:91): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:02.682669 kernel: audit: type=1302 audit(1707434392.864:91): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:02.682683 kernel: audit: type=1327 audit(1707434392.864:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:20:02.682701 systemd[1]: Populated /etc with preset unit settings. Feb 8 23:20:02.682717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:20:02.682733 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:20:02.682751 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:20:02.682766 kernel: audit: type=1334 audit(1707434402.156:92): prog-id=12 op=LOAD Feb 8 23:20:02.682780 kernel: audit: type=1334 audit(1707434402.156:93): prog-id=3 op=UNLOAD Feb 8 23:20:02.682795 kernel: audit: type=1334 audit(1707434402.162:94): prog-id=13 op=LOAD Feb 8 23:20:02.682809 kernel: audit: type=1334 audit(1707434402.172:95): prog-id=14 op=LOAD Feb 8 23:20:02.682825 kernel: audit: type=1334 audit(1707434402.172:96): prog-id=4 op=UNLOAD Feb 8 23:20:02.682841 kernel: audit: type=1334 audit(1707434402.172:97): prog-id=5 op=UNLOAD Feb 8 23:20:02.682860 kernel: audit: type=1334 audit(1707434402.182:98): prog-id=15 op=LOAD Feb 8 23:20:02.682875 kernel: audit: type=1334 audit(1707434402.182:99): prog-id=12 op=UNLOAD Feb 8 23:20:02.682890 kernel: audit: type=1334 audit(1707434402.187:100): prog-id=16 op=LOAD Feb 8 23:20:02.682905 kernel: audit: type=1334 audit(1707434402.192:101): prog-id=17 op=LOAD Feb 8 23:20:02.682921 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 8 23:20:02.682936 systemd[1]: Stopped initrd-switch-root.service. Feb 8 23:20:02.682957 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 8 23:20:02.682980 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 8 23:20:02.682997 systemd[1]: Created slice system-addon\x2drun.slice. Feb 8 23:20:02.683013 systemd[1]: Created slice system-getty.slice. Feb 8 23:20:02.683029 systemd[1]: Created slice system-modprobe.slice. Feb 8 23:20:02.683046 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 8 23:20:02.683062 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 8 23:20:02.683079 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 8 23:20:02.683098 systemd[1]: Created slice user.slice. Feb 8 23:20:02.683112 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:20:02.683202 systemd[1]: Started systemd-ask-password-wall.path. Feb 8 23:20:02.683214 systemd[1]: Set up automount boot.automount. Feb 8 23:20:02.683224 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 8 23:20:02.683234 systemd[1]: Stopped target initrd-switch-root.target. Feb 8 23:20:02.683243 systemd[1]: Stopped target initrd-fs.target. Feb 8 23:20:02.683253 systemd[1]: Stopped target initrd-root-fs.target. Feb 8 23:20:02.683262 systemd[1]: Reached target integritysetup.target. Feb 8 23:20:02.683275 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:20:02.683284 systemd[1]: Reached target remote-fs.target. Feb 8 23:20:02.683294 systemd[1]: Reached target slices.target. Feb 8 23:20:02.683304 systemd[1]: Reached target swap.target. Feb 8 23:20:02.683313 systemd[1]: Reached target torcx.target. Feb 8 23:20:02.683323 systemd[1]: Reached target veritysetup.target. Feb 8 23:20:02.683332 systemd[1]: Listening on systemd-coredump.socket. Feb 8 23:20:02.683342 systemd[1]: Listening on systemd-initctl.socket. Feb 8 23:20:02.683353 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:20:02.683364 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:20:02.683373 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:20:02.683383 systemd[1]: Listening on systemd-userdbd.socket. Feb 8 23:20:02.683393 systemd[1]: Mounting dev-hugepages.mount... Feb 8 23:20:02.683405 systemd[1]: Mounting dev-mqueue.mount... Feb 8 23:20:02.683414 systemd[1]: Mounting media.mount... Feb 8 23:20:02.683424 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:20:02.683434 systemd[1]: Mounting sys-kernel-debug.mount... Feb 8 23:20:02.683444 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 8 23:20:02.683453 systemd[1]: Mounting tmp.mount... Feb 8 23:20:02.683465 systemd[1]: Starting flatcar-tmpfiles.service... Feb 8 23:20:02.683474 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 8 23:20:02.683484 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:20:02.683496 systemd[1]: Starting modprobe@configfs.service... Feb 8 23:20:02.683505 systemd[1]: Starting modprobe@dm_mod.service... Feb 8 23:20:02.683515 systemd[1]: Starting modprobe@drm.service... Feb 8 23:20:02.683525 systemd[1]: Starting modprobe@efi_pstore.service... Feb 8 23:20:02.683534 systemd[1]: Starting modprobe@fuse.service... Feb 8 23:20:02.683544 systemd[1]: Starting modprobe@loop.service... Feb 8 23:20:02.683554 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 8 23:20:02.683564 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 8 23:20:02.683575 systemd[1]: Stopped systemd-fsck-root.service. Feb 8 23:20:02.683585 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 8 23:20:02.683594 systemd[1]: Stopped systemd-fsck-usr.service. Feb 8 23:20:02.683604 systemd[1]: Stopped systemd-journald.service. Feb 8 23:20:02.683613 systemd[1]: Starting systemd-journald.service... Feb 8 23:20:02.683623 kernel: loop: module loaded Feb 8 23:20:02.683632 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:20:02.683642 systemd[1]: Starting systemd-network-generator.service... Feb 8 23:20:02.683651 systemd[1]: Starting systemd-remount-fs.service... Feb 8 23:20:02.683662 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:20:02.683674 systemd[1]: verity-setup.service: Deactivated successfully. Feb 8 23:20:02.683683 systemd[1]: Stopped verity-setup.service. Feb 8 23:20:02.683693 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:20:02.683703 kernel: fuse: init (API version 7.34) Feb 8 23:20:02.683712 systemd[1]: Mounted dev-hugepages.mount. Feb 8 23:20:02.683721 systemd[1]: Mounted dev-mqueue.mount. Feb 8 23:20:02.683730 systemd[1]: Mounted media.mount. Feb 8 23:20:02.683740 systemd[1]: Mounted sys-kernel-debug.mount. Feb 8 23:20:02.683751 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 8 23:20:02.683761 systemd[1]: Mounted tmp.mount. Feb 8 23:20:02.683770 systemd[1]: Finished flatcar-tmpfiles.service. Feb 8 23:20:02.683780 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:20:02.683794 systemd-journald[1174]: Journal started Feb 8 23:20:02.683838 systemd-journald[1174]: Runtime Journal (/run/log/journal/9cf7fc39a3324ef8b762262b9d3ba6d7) is 8.0M, max 159.0M, 151.0M free. Feb 8 23:19:50.650000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 8 23:19:51.371000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:19:51.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:19:51.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:19:51.392000 audit: BPF prog-id=10 op=LOAD Feb 8 23:19:51.392000 audit: BPF prog-id=10 op=UNLOAD Feb 8 23:19:51.393000 audit: BPF prog-id=11 op=LOAD Feb 8 23:19:51.393000 audit: BPF prog-id=11 op=UNLOAD Feb 8 23:19:52.857000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:19:52.857000 audit[1064]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:52.857000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:19:52.864000 audit[1064]: AVC avc: denied { associate } for pid=1064 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:19:52.864000 audit[1064]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248d9 a2=1ed a3=0 items=2 ppid=1047 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:52.864000 audit: CWD cwd="/" Feb 8 23:19:52.864000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:52.864000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:52.864000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:20:02.156000 audit: BPF prog-id=12 op=LOAD Feb 8 23:20:02.156000 audit: BPF prog-id=3 op=UNLOAD Feb 8 23:20:02.162000 audit: BPF prog-id=13 op=LOAD Feb 8 23:20:02.172000 audit: BPF prog-id=14 op=LOAD Feb 8 23:20:02.172000 audit: BPF prog-id=4 op=UNLOAD Feb 8 23:20:02.172000 audit: BPF prog-id=5 op=UNLOAD Feb 8 23:20:02.182000 audit: BPF prog-id=15 op=LOAD Feb 8 23:20:02.182000 audit: BPF prog-id=12 op=UNLOAD Feb 8 23:20:02.187000 audit: BPF prog-id=16 op=LOAD Feb 8 23:20:02.192000 audit: BPF prog-id=17 op=LOAD Feb 8 23:20:02.192000 audit: BPF prog-id=13 op=UNLOAD Feb 8 23:20:02.192000 audit: BPF prog-id=14 op=UNLOAD Feb 8 23:20:02.197000 audit: BPF prog-id=18 op=LOAD Feb 8 23:20:02.197000 audit: BPF prog-id=15 op=UNLOAD Feb 8 23:20:02.207000 audit: BPF prog-id=19 op=LOAD Feb 8 23:20:02.207000 audit: BPF prog-id=20 op=LOAD Feb 8 23:20:02.207000 audit: BPF prog-id=16 op=UNLOAD Feb 8 23:20:02.207000 audit: BPF prog-id=17 op=UNLOAD Feb 8 23:20:02.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.221000 audit: BPF prog-id=18 op=UNLOAD Feb 8 23:20:02.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.573000 audit: BPF prog-id=21 op=LOAD Feb 8 23:20:02.573000 audit: BPF prog-id=22 op=LOAD Feb 8 23:20:02.573000 audit: BPF prog-id=23 op=LOAD Feb 8 23:20:02.573000 audit: BPF prog-id=19 op=UNLOAD Feb 8 23:20:02.573000 audit: BPF prog-id=20 op=UNLOAD Feb 8 23:20:02.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.676000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 8 23:20:02.676000 audit[1174]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffce571cfc0 a2=4000 a3=7ffce571d05c items=0 ppid=1 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:02.676000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 8 23:20:02.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:52.804474 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:20:02.154567 systemd[1]: Queued start job for default target multi-user.target. Feb 8 23:19:52.822256 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:20:02.208091 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 8 23:19:52.822291 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:19:52.822334 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 8 23:19:52.822347 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 8 23:19:52.822403 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 8 23:19:52.822419 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 8 23:19:52.822665 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 8 23:19:52.822708 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:19:52.822724 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:19:52.840192 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 8 23:19:52.840240 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 8 23:19:52.840288 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 8 23:19:52.840308 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 8 23:19:52.840331 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 8 23:19:52.840348 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:19:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 8 23:20:01.054964 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:20:01.055228 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:20:01.055323 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:20:01.055493 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:20:01.055548 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 8 23:20:01.055603 /usr/lib/systemd/system-generators/torcx-generator[1064]: time="2024-02-08T23:20:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 8 23:20:02.688135 systemd[1]: Started systemd-journald.service. Feb 8 23:20:02.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.690693 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 8 23:20:02.690836 systemd[1]: Finished modprobe@configfs.service. Feb 8 23:20:02.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.693348 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 8 23:20:02.693491 systemd[1]: Finished modprobe@dm_mod.service. Feb 8 23:20:02.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.696013 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 8 23:20:02.696166 systemd[1]: Finished modprobe@drm.service. Feb 8 23:20:02.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.698834 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 8 23:20:02.698972 systemd[1]: Finished modprobe@efi_pstore.service. Feb 8 23:20:02.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.701614 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 8 23:20:02.701751 systemd[1]: Finished modprobe@fuse.service. Feb 8 23:20:02.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.705284 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 8 23:20:02.705420 systemd[1]: Finished modprobe@loop.service. Feb 8 23:20:02.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.707878 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:20:02.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.710529 systemd[1]: Finished systemd-network-generator.service. Feb 8 23:20:02.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.713220 systemd[1]: Finished systemd-remount-fs.service. Feb 8 23:20:02.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.716130 systemd[1]: Reached target network-pre.target. Feb 8 23:20:02.719464 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 8 23:20:02.725391 systemd[1]: Mounting sys-kernel-config.mount... Feb 8 23:20:02.727442 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 8 23:20:02.733335 systemd[1]: Starting systemd-hwdb-update.service... Feb 8 23:20:02.737442 systemd[1]: Starting systemd-journal-flush.service... Feb 8 23:20:02.740269 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 8 23:20:02.741585 systemd[1]: Starting systemd-random-seed.service... Feb 8 23:20:02.743930 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 8 23:20:02.745283 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:20:02.748819 systemd[1]: Starting systemd-sysusers.service... Feb 8 23:20:02.753549 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 8 23:20:02.758486 systemd[1]: Mounted sys-kernel-config.mount. Feb 8 23:20:02.769857 systemd[1]: Finished systemd-random-seed.service. Feb 8 23:20:02.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.772397 systemd[1]: Reached target first-boot-complete.target. Feb 8 23:20:02.791703 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:20:02.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.795061 systemd-journald[1174]: Time spent on flushing to /var/log/journal/9cf7fc39a3324ef8b762262b9d3ba6d7 is 24.355ms for 1204 entries. Feb 8 23:20:02.795061 systemd-journald[1174]: System Journal (/var/log/journal/9cf7fc39a3324ef8b762262b9d3ba6d7) is 8.0M, max 2.6G, 2.6G free. Feb 8 23:20:02.876705 systemd-journald[1174]: Received client request to flush runtime journal. Feb 8 23:20:02.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:02.800464 systemd[1]: Starting systemd-udev-settle.service... Feb 8 23:20:02.811046 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:20:02.882538 udevadm[1189]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 8 23:20:02.877616 systemd[1]: Finished systemd-journal-flush.service. Feb 8 23:20:02.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:03.316567 systemd[1]: Finished systemd-sysusers.service. Feb 8 23:20:03.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:03.321853 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:20:03.678706 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:20:03.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:03.946250 systemd[1]: Finished systemd-hwdb-update.service. Feb 8 23:20:03.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:03.949000 audit: BPF prog-id=24 op=LOAD Feb 8 23:20:03.949000 audit: BPF prog-id=25 op=LOAD Feb 8 23:20:03.949000 audit: BPF prog-id=7 op=UNLOAD Feb 8 23:20:03.949000 audit: BPF prog-id=8 op=UNLOAD Feb 8 23:20:03.950888 systemd[1]: Starting systemd-udevd.service... Feb 8 23:20:03.969207 systemd-udevd[1193]: Using default interface naming scheme 'v252'. Feb 8 23:20:04.247545 systemd[1]: Started systemd-udevd.service. Feb 8 23:20:04.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:04.251000 audit: BPF prog-id=26 op=LOAD Feb 8 23:20:04.252521 systemd[1]: Starting systemd-networkd.service... Feb 8 23:20:04.291856 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 8 23:20:04.360169 kernel: mousedev: PS/2 mouse device common for all mice Feb 8 23:20:04.388321 kernel: hv_utils: Registering HyperV Utility Driver Feb 8 23:20:04.388417 kernel: hv_vmbus: registering driver hv_utils Feb 8 23:20:04.380000 audit[1209]: AVC avc: denied { confidentiality } for pid=1209 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:20:04.395179 kernel: hv_vmbus: registering driver hv_balloon Feb 8 23:20:05.489797 kernel: hv_vmbus: registering driver hyperv_fb Feb 8 23:20:05.489862 kernel: hv_utils: Heartbeat IC version 3.0 Feb 8 23:20:05.489887 kernel: hv_utils: Shutdown IC version 3.2 Feb 8 23:20:05.489910 kernel: hv_utils: TimeSync IC version 4.0 Feb 8 23:20:05.489930 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 8 23:20:05.490000 audit: BPF prog-id=27 op=LOAD Feb 8 23:20:05.490000 audit: BPF prog-id=28 op=LOAD Feb 8 23:20:05.490000 audit: BPF prog-id=29 op=LOAD Feb 8 23:20:04.380000 audit[1209]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1086f6280 a1=f884 a2=7f6a4931dbc5 a3=5 items=12 ppid=1193 pid=1209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:05.492840 systemd[1]: Starting systemd-userdbd.service... Feb 8 23:20:04.380000 audit: CWD cwd="/" Feb 8 23:20:04.380000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=1 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=2 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=3 name=(null) inode=15007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=4 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=5 name=(null) inode=15008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=6 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=7 name=(null) inode=15009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=8 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=9 name=(null) inode=15010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=10 name=(null) inode=15006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PATH item=11 name=(null) inode=15011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:04.380000 audit: PROCTITLE proctitle="(udev-worker)" Feb 8 23:20:05.506813 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 8 23:20:05.506885 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 8 23:20:05.513994 kernel: Console: switching to colour dummy device 80x25 Feb 8 23:20:05.518447 kernel: Console: switching to colour frame buffer device 128x48 Feb 8 23:20:05.577098 systemd[1]: Started systemd-userdbd.service. Feb 8 23:20:05.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:05.792455 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 8 23:20:05.813469 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1202) Feb 8 23:20:05.839414 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:20:05.847780 systemd[1]: Finished systemd-udev-settle.service. Feb 8 23:20:05.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:05.851371 systemd[1]: Starting lvm2-activation-early.service... Feb 8 23:20:05.868737 systemd-networkd[1204]: lo: Link UP Feb 8 23:20:05.868991 systemd-networkd[1204]: lo: Gained carrier Feb 8 23:20:05.869561 systemd-networkd[1204]: Enumeration completed Feb 8 23:20:05.869734 systemd[1]: Started systemd-networkd.service. Feb 8 23:20:05.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:05.873182 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:20:05.901350 systemd-networkd[1204]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:20:05.955451 kernel: mlx5_core 4cae:00:02.0 enP19630s1: Link up Feb 8 23:20:06.002458 kernel: hv_netvsc 000d3a69-6065-000d-3a69-6065000d3a69 eth0: Data path switched to VF: enP19630s1 Feb 8 23:20:06.003975 systemd-networkd[1204]: enP19630s1: Link UP Feb 8 23:20:06.004145 systemd-networkd[1204]: eth0: Link UP Feb 8 23:20:06.004152 systemd-networkd[1204]: eth0: Gained carrier Feb 8 23:20:06.008979 systemd-networkd[1204]: enP19630s1: Gained carrier Feb 8 23:20:06.038575 systemd-networkd[1204]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:20:06.229889 lvm[1270]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:20:06.255753 systemd[1]: Finished lvm2-activation-early.service. Feb 8 23:20:06.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:06.259062 systemd[1]: Reached target cryptsetup.target. Feb 8 23:20:06.262764 systemd[1]: Starting lvm2-activation.service... Feb 8 23:20:06.267130 lvm[1272]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:20:06.287657 systemd[1]: Finished lvm2-activation.service. Feb 8 23:20:06.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:06.290641 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:20:06.293010 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 8 23:20:06.293043 systemd[1]: Reached target local-fs.target. Feb 8 23:20:06.295222 systemd[1]: Reached target machines.target. Feb 8 23:20:06.298323 systemd[1]: Starting ldconfig.service... Feb 8 23:20:06.300568 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 8 23:20:06.300659 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:20:06.301773 systemd[1]: Starting systemd-boot-update.service... Feb 8 23:20:06.305252 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 8 23:20:06.309028 systemd[1]: Starting systemd-machine-id-commit.service... Feb 8 23:20:06.311745 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:20:06.311830 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:20:06.312899 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 8 23:20:06.346414 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1274 (bootctl) Feb 8 23:20:06.347679 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 8 23:20:06.355975 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 8 23:20:06.356737 systemd[1]: Finished systemd-machine-id-commit.service. Feb 8 23:20:06.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:06.381083 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 8 23:20:06.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:06.423496 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 8 23:20:06.438704 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 8 23:20:06.440116 systemd-tmpfiles[1277]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 8 23:20:07.171701 systemd-networkd[1204]: eth0: Gained IPv6LL Feb 8 23:20:07.177647 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:20:07.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.239660 systemd-fsck[1282]: fsck.fat 4.2 (2021-01-31) Feb 8 23:20:07.239660 systemd-fsck[1282]: /dev/sda1: 789 files, 115332/258078 clusters Feb 8 23:20:07.242179 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 8 23:20:07.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.247043 systemd[1]: Mounting boot.mount... Feb 8 23:20:07.258925 systemd[1]: Mounted boot.mount. Feb 8 23:20:07.274416 systemd[1]: Finished systemd-boot-update.service. Feb 8 23:20:07.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.657465 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 8 23:20:07.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.661487 systemd[1]: Starting audit-rules.service... Feb 8 23:20:07.665212 systemd[1]: Starting clean-ca-certificates.service... Feb 8 23:20:07.668963 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 8 23:20:07.672000 audit: BPF prog-id=30 op=LOAD Feb 8 23:20:07.673823 systemd[1]: Starting systemd-resolved.service... Feb 8 23:20:07.677000 audit: BPF prog-id=31 op=LOAD Feb 8 23:20:07.678727 systemd[1]: Starting systemd-timesyncd.service... Feb 8 23:20:07.682242 systemd[1]: Starting systemd-update-utmp.service... Feb 8 23:20:07.708000 audit[1294]: SYSTEM_BOOT pid=1294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.711100 systemd[1]: Finished systemd-update-utmp.service. Feb 8 23:20:07.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.746508 systemd[1]: Finished clean-ca-certificates.service. Feb 8 23:20:07.749259 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 8 23:20:07.777527 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 8 23:20:07.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.783721 systemd[1]: Started systemd-timesyncd.service. Feb 8 23:20:07.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.786438 systemd[1]: Reached target time-set.target. Feb 8 23:20:07.849247 systemd-resolved[1292]: Positive Trust Anchors: Feb 8 23:20:07.849269 systemd-resolved[1292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:20:07.849318 systemd-resolved[1292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:20:07.918054 systemd-timesyncd[1293]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). Feb 8 23:20:07.918120 systemd-timesyncd[1293]: Initial clock synchronization to Thu 2024-02-08 23:20:07.918950 UTC. Feb 8 23:20:07.977402 systemd-resolved[1292]: Using system hostname 'ci-3510.3.2-a-a74a3a29e1'. Feb 8 23:20:07.979117 systemd[1]: Started systemd-resolved.service. Feb 8 23:20:07.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:20:07.981549 systemd[1]: Reached target network.target. Feb 8 23:20:07.983869 systemd[1]: Reached target network-online.target. Feb 8 23:20:07.986008 systemd[1]: Reached target nss-lookup.target. Feb 8 23:20:08.018000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 8 23:20:08.018000 audit[1309]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc5742bb20 a2=420 a3=0 items=0 ppid=1288 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:08.018000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 8 23:20:08.019771 augenrules[1309]: No rules Feb 8 23:20:08.020370 systemd[1]: Finished audit-rules.service. Feb 8 23:20:13.998169 ldconfig[1273]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 8 23:20:14.010107 systemd[1]: Finished ldconfig.service. Feb 8 23:20:14.014299 systemd[1]: Starting systemd-update-done.service... Feb 8 23:20:14.036296 systemd[1]: Finished systemd-update-done.service. Feb 8 23:20:14.039010 systemd[1]: Reached target sysinit.target. Feb 8 23:20:14.041207 systemd[1]: Started motdgen.path. Feb 8 23:20:14.043045 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 8 23:20:14.045937 systemd[1]: Started logrotate.timer. Feb 8 23:20:14.049267 systemd[1]: Started mdadm.timer. Feb 8 23:20:14.050966 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 8 23:20:14.053063 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 8 23:20:14.053104 systemd[1]: Reached target paths.target. Feb 8 23:20:14.054962 systemd[1]: Reached target timers.target. Feb 8 23:20:14.057482 systemd[1]: Listening on dbus.socket. Feb 8 23:20:14.060462 systemd[1]: Starting docker.socket... Feb 8 23:20:14.064407 systemd[1]: Listening on sshd.socket. Feb 8 23:20:14.066693 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:20:14.067140 systemd[1]: Listening on docker.socket. Feb 8 23:20:14.069254 systemd[1]: Reached target sockets.target. Feb 8 23:20:14.071349 systemd[1]: Reached target basic.target. Feb 8 23:20:14.073518 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:20:14.073552 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:20:14.074536 systemd[1]: Starting containerd.service... Feb 8 23:20:14.077843 systemd[1]: Starting dbus.service... Feb 8 23:20:14.080552 systemd[1]: Starting enable-oem-cloudinit.service... Feb 8 23:20:14.083668 systemd[1]: Starting extend-filesystems.service... Feb 8 23:20:14.085759 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 8 23:20:14.087005 systemd[1]: Starting motdgen.service... Feb 8 23:20:14.090291 systemd[1]: Started nvidia.service. Feb 8 23:20:14.094132 systemd[1]: Starting prepare-cni-plugins.service... Feb 8 23:20:14.097531 systemd[1]: Starting prepare-critools.service... Feb 8 23:20:14.101111 systemd[1]: Starting prepare-helm.service... Feb 8 23:20:14.104156 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 8 23:20:14.107589 systemd[1]: Starting sshd-keygen.service... Feb 8 23:20:14.114097 systemd[1]: Starting systemd-logind.service... Feb 8 23:20:14.115934 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:20:14.116036 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 8 23:20:14.116576 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 8 23:20:14.117376 systemd[1]: Starting update-engine.service... Feb 8 23:20:14.120818 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 8 23:20:14.128948 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 8 23:20:14.129523 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda1 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda2 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda3 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found usr Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda4 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda6 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda7 Feb 8 23:20:14.197880 extend-filesystems[1320]: Found sda9 Feb 8 23:20:14.197880 extend-filesystems[1320]: Checking size of /dev/sda9 Feb 8 23:20:14.239976 jq[1337]: true Feb 8 23:20:14.253595 jq[1319]: false Feb 8 23:20:14.207020 systemd[1]: motdgen.service: Deactivated successfully. Feb 8 23:20:14.253809 jq[1354]: true Feb 8 23:20:14.254018 tar[1340]: crictl Feb 8 23:20:14.254253 tar[1339]: ./ Feb 8 23:20:14.254253 tar[1339]: ./loopback Feb 8 23:20:14.207268 systemd[1]: Finished motdgen.service. Feb 8 23:20:14.209594 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 8 23:20:14.209751 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 8 23:20:14.239969 systemd-logind[1333]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 8 23:20:14.240223 systemd-logind[1333]: New seat seat0. Feb 8 23:20:14.260165 tar[1341]: linux-amd64/helm Feb 8 23:20:14.322499 env[1351]: time="2024-02-08T23:20:14.322445407Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 8 23:20:14.338042 extend-filesystems[1320]: Old size kept for /dev/sda9 Feb 8 23:20:14.338042 extend-filesystems[1320]: Found sr0 Feb 8 23:20:14.339787 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 8 23:20:14.339954 systemd[1]: Finished extend-filesystems.service. Feb 8 23:20:14.408761 dbus-daemon[1318]: [system] SELinux support is enabled Feb 8 23:20:14.408937 systemd[1]: Started dbus.service. Feb 8 23:20:14.413786 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 8 23:20:14.413820 systemd[1]: Reached target system-config.target. Feb 8 23:20:14.416607 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 8 23:20:14.416635 systemd[1]: Reached target user-config.target. Feb 8 23:20:14.418105 tar[1339]: ./bandwidth Feb 8 23:20:14.423713 systemd[1]: Started systemd-logind.service. Feb 8 23:20:14.426328 dbus-daemon[1318]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 8 23:20:14.476422 bash[1387]: Updated "/home/core/.ssh/authorized_keys" Feb 8 23:20:14.476633 env[1351]: time="2024-02-08T23:20:14.476166100Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 8 23:20:14.476633 env[1351]: time="2024-02-08T23:20:14.476305605Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.477294 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 8 23:20:14.480586 env[1351]: time="2024-02-08T23:20:14.480489179Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:20:14.480586 env[1351]: time="2024-02-08T23:20:14.480528881Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.480823 env[1351]: time="2024-02-08T23:20:14.480792492Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:20:14.480880 env[1351]: time="2024-02-08T23:20:14.480826893Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.480880 env[1351]: time="2024-02-08T23:20:14.480846594Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 8 23:20:14.480880 env[1351]: time="2024-02-08T23:20:14.480861495Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.480982 env[1351]: time="2024-02-08T23:20:14.480968799Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.481256 env[1351]: time="2024-02-08T23:20:14.481230810Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:20:14.481480 env[1351]: time="2024-02-08T23:20:14.481453120Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:20:14.481544 env[1351]: time="2024-02-08T23:20:14.481482221Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 8 23:20:14.481584 env[1351]: time="2024-02-08T23:20:14.481548623Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 8 23:20:14.481584 env[1351]: time="2024-02-08T23:20:14.481565224Z" level=info msg="metadata content store policy set" policy=shared Feb 8 23:20:14.499691 env[1351]: time="2024-02-08T23:20:14.499648476Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 8 23:20:14.499811 env[1351]: time="2024-02-08T23:20:14.499700078Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 8 23:20:14.499811 env[1351]: time="2024-02-08T23:20:14.499718279Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 8 23:20:14.499811 env[1351]: time="2024-02-08T23:20:14.499760581Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499811 env[1351]: time="2024-02-08T23:20:14.499779682Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499811 env[1351]: time="2024-02-08T23:20:14.499797582Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499815283Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499843584Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499862885Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499886186Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499903887Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.499997 env[1351]: time="2024-02-08T23:20:14.499922288Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 8 23:20:14.500207 env[1351]: time="2024-02-08T23:20:14.500053493Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 8 23:20:14.500207 env[1351]: time="2024-02-08T23:20:14.500150097Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 8 23:20:14.500500 env[1351]: time="2024-02-08T23:20:14.500474711Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 8 23:20:14.500574 env[1351]: time="2024-02-08T23:20:14.500517412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500574 env[1351]: time="2024-02-08T23:20:14.500537813Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 8 23:20:14.500650 env[1351]: time="2024-02-08T23:20:14.500593316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500650 env[1351]: time="2024-02-08T23:20:14.500614216Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500650 env[1351]: time="2024-02-08T23:20:14.500632417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500650418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500674719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500694220Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500711020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500727621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500761 env[1351]: time="2024-02-08T23:20:14.500745722Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 8 23:20:14.500973 env[1351]: time="2024-02-08T23:20:14.500892528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500973 env[1351]: time="2024-02-08T23:20:14.500912729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500973 env[1351]: time="2024-02-08T23:20:14.500931130Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.500973 env[1351]: time="2024-02-08T23:20:14.500948030Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 8 23:20:14.501109 env[1351]: time="2024-02-08T23:20:14.500970531Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 8 23:20:14.501109 env[1351]: time="2024-02-08T23:20:14.500986432Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 8 23:20:14.501109 env[1351]: time="2024-02-08T23:20:14.501015833Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 8 23:20:14.501109 env[1351]: time="2024-02-08T23:20:14.501059935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 8 23:20:14.501400 env[1351]: time="2024-02-08T23:20:14.501331546Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.501419450Z" level=info msg="Connect containerd service" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.501589657Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502471894Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502560297Z" level=info msg="Start subscribing containerd event" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502613400Z" level=info msg="Start recovering state" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502678602Z" level=info msg="Start event monitor" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502700703Z" level=info msg="Start snapshots syncer" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502714204Z" level=info msg="Start cni network conf syncer for default" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.502725104Z" level=info msg="Start streaming server" Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.503194724Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.503281727Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 8 23:20:14.535723 env[1351]: time="2024-02-08T23:20:14.516374472Z" level=info msg="containerd successfully booted in 0.201637s" Feb 8 23:20:14.516344 systemd[1]: Started containerd.service. Feb 8 23:20:14.570658 systemd[1]: nvidia.service: Deactivated successfully. Feb 8 23:20:14.616320 tar[1339]: ./ptp Feb 8 23:20:14.725526 tar[1339]: ./vlan Feb 8 23:20:14.815502 tar[1339]: ./host-device Feb 8 23:20:14.903176 tar[1339]: ./tuning Feb 8 23:20:14.983861 tar[1339]: ./vrf Feb 8 23:20:15.070489 tar[1339]: ./sbr Feb 8 23:20:15.074303 update_engine[1335]: I0208 23:20:15.073588 1335 main.cc:92] Flatcar Update Engine starting Feb 8 23:20:15.133667 systemd[1]: Started update-engine.service. Feb 8 23:20:15.135788 update_engine[1335]: I0208 23:20:15.135576 1335 update_check_scheduler.cc:74] Next update check in 8m48s Feb 8 23:20:15.139409 systemd[1]: Started locksmithd.service. Feb 8 23:20:15.154454 tar[1339]: ./tap Feb 8 23:20:15.247680 tar[1339]: ./dhcp Feb 8 23:20:15.437148 tar[1341]: linux-amd64/LICENSE Feb 8 23:20:15.437536 tar[1341]: linux-amd64/README.md Feb 8 23:20:15.445541 systemd[1]: Finished prepare-critools.service. Feb 8 23:20:15.449765 systemd[1]: Finished prepare-helm.service. Feb 8 23:20:15.469070 tar[1339]: ./static Feb 8 23:20:15.500767 tar[1339]: ./firewall Feb 8 23:20:15.549345 tar[1339]: ./macvlan Feb 8 23:20:15.593651 tar[1339]: ./dummy Feb 8 23:20:15.636820 tar[1339]: ./bridge Feb 8 23:20:15.684205 tar[1339]: ./ipvlan Feb 8 23:20:15.728238 tar[1339]: ./portmap Feb 8 23:20:15.769662 tar[1339]: ./host-local Feb 8 23:20:15.859485 systemd[1]: Finished prepare-cni-plugins.service. Feb 8 23:20:15.924402 sshd_keygen[1342]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 8 23:20:15.944592 systemd[1]: Finished sshd-keygen.service. Feb 8 23:20:15.948301 systemd[1]: Starting issuegen.service... Feb 8 23:20:15.951694 systemd[1]: Started waagent.service. Feb 8 23:20:15.958525 systemd[1]: issuegen.service: Deactivated successfully. Feb 8 23:20:15.958650 systemd[1]: Finished issuegen.service. Feb 8 23:20:15.963854 systemd[1]: Starting systemd-user-sessions.service... Feb 8 23:20:15.971533 systemd[1]: Finished systemd-user-sessions.service. Feb 8 23:20:15.975424 systemd[1]: Started getty@tty1.service. Feb 8 23:20:15.979116 systemd[1]: Started serial-getty@ttyS0.service. Feb 8 23:20:15.981713 systemd[1]: Reached target getty.target. Feb 8 23:20:15.984029 systemd[1]: Reached target multi-user.target. Feb 8 23:20:15.987576 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 8 23:20:15.995678 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 8 23:20:15.995852 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 8 23:20:15.998803 systemd[1]: Startup finished in 1.063s (firmware) + 31.445s (loader) + 944ms (kernel) + 1min 51.319s (initrd) + 24.885s (userspace) = 2min 49.658s. Feb 8 23:20:16.406088 login[1441]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 8 23:20:16.409206 login[1442]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 8 23:20:16.431820 systemd[1]: Created slice user-500.slice. Feb 8 23:20:16.433457 systemd[1]: Starting user-runtime-dir@500.service... Feb 8 23:20:16.436494 systemd-logind[1333]: New session 2 of user core. Feb 8 23:20:16.440831 systemd-logind[1333]: New session 1 of user core. Feb 8 23:20:16.446037 systemd[1]: Finished user-runtime-dir@500.service. Feb 8 23:20:16.447613 systemd[1]: Starting user@500.service... Feb 8 23:20:16.450833 (systemd)[1448]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:16.633531 systemd[1448]: Queued start job for default target default.target. Feb 8 23:20:16.634705 systemd[1448]: Reached target paths.target. Feb 8 23:20:16.634740 systemd[1448]: Reached target sockets.target. Feb 8 23:20:16.634761 systemd[1448]: Reached target timers.target. Feb 8 23:20:16.634780 systemd[1448]: Reached target basic.target. Feb 8 23:20:16.634842 systemd[1448]: Reached target default.target. Feb 8 23:20:16.634890 systemd[1448]: Startup finished in 178ms. Feb 8 23:20:16.634936 systemd[1]: Started user@500.service. Feb 8 23:20:16.636585 systemd[1]: Started session-1.scope. Feb 8 23:20:16.637646 systemd[1]: Started session-2.scope. Feb 8 23:20:17.071228 locksmithd[1423]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 8 23:20:22.481346 waagent[1436]: 2024-02-08T23:20:22.481232Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 8 23:20:22.494934 waagent[1436]: 2024-02-08T23:20:22.483764Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 8 23:20:22.494934 waagent[1436]: 2024-02-08T23:20:22.484725Z INFO Daemon Daemon Python: 3.9.16 Feb 8 23:20:22.494934 waagent[1436]: 2024-02-08T23:20:22.486013Z INFO Daemon Daemon Run daemon Feb 8 23:20:22.494934 waagent[1436]: 2024-02-08T23:20:22.486924Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 8 23:20:22.500036 waagent[1436]: 2024-02-08T23:20:22.499926Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 8 23:20:22.507121 waagent[1436]: 2024-02-08T23:20:22.507019Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.508413Z INFO Daemon Daemon cloud-init is enabled: False Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.509237Z INFO Daemon Daemon Using waagent for provisioning Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.510872Z INFO Daemon Daemon Activate resource disk Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.512387Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.520076Z INFO Daemon Daemon Found device: None Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.521116Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.521978Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.523651Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.524330Z INFO Daemon Daemon Running default provisioning handler Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.532795Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.535510Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.536466Z INFO Daemon Daemon cloud-init is enabled: False Feb 8 23:20:22.557312 waagent[1436]: 2024-02-08T23:20:22.537406Z INFO Daemon Daemon Copying ovf-env.xml Feb 8 23:20:22.630762 waagent[1436]: 2024-02-08T23:20:22.626811Z INFO Daemon Daemon Successfully mounted dvd Feb 8 23:20:22.756279 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 8 23:20:22.762588 waagent[1436]: 2024-02-08T23:20:22.762417Z INFO Daemon Daemon Detect protocol endpoint Feb 8 23:20:22.765753 waagent[1436]: 2024-02-08T23:20:22.765678Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 8 23:20:22.768798 waagent[1436]: 2024-02-08T23:20:22.768730Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 8 23:20:22.772151 waagent[1436]: 2024-02-08T23:20:22.772085Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 8 23:20:22.774904 waagent[1436]: 2024-02-08T23:20:22.774843Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 8 23:20:22.777536 waagent[1436]: 2024-02-08T23:20:22.777480Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 8 23:20:22.892137 waagent[1436]: 2024-02-08T23:20:22.892044Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 8 23:20:22.900091 waagent[1436]: 2024-02-08T23:20:22.894037Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 8 23:20:22.900091 waagent[1436]: 2024-02-08T23:20:22.894778Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 8 23:20:23.392441 waagent[1436]: 2024-02-08T23:20:23.392265Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 8 23:20:23.404054 waagent[1436]: 2024-02-08T23:20:23.403968Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 8 23:20:23.409440 waagent[1436]: 2024-02-08T23:20:23.405419Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 8 23:20:23.494870 waagent[1436]: 2024-02-08T23:20:23.494741Z INFO Daemon Daemon Found private key matching thumbprint 20F6F088945D2A82C32200F61EAB1023F7309EF6 Feb 8 23:20:23.500247 waagent[1436]: 2024-02-08T23:20:23.500173Z INFO Daemon Daemon Certificate with thumbprint 42AF37DF0E0D92FD6FD932B028FD69417086C43B has no matching private key. Feb 8 23:20:23.504932 waagent[1436]: 2024-02-08T23:20:23.504861Z INFO Daemon Daemon Fetch goal state completed Feb 8 23:20:23.555800 waagent[1436]: 2024-02-08T23:20:23.555724Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: db1391a7-e365-4393-9e92-38c5019b46af New eTag: 11597205628337106441] Feb 8 23:20:23.561559 waagent[1436]: 2024-02-08T23:20:23.561489Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 8 23:20:23.575259 waagent[1436]: 2024-02-08T23:20:23.575194Z INFO Daemon Daemon Starting provisioning Feb 8 23:20:23.577932 waagent[1436]: 2024-02-08T23:20:23.577869Z INFO Daemon Daemon Handle ovf-env.xml. Feb 8 23:20:23.580337 waagent[1436]: 2024-02-08T23:20:23.580280Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-a74a3a29e1] Feb 8 23:20:23.601609 waagent[1436]: 2024-02-08T23:20:23.601490Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-a74a3a29e1] Feb 8 23:20:23.605779 waagent[1436]: 2024-02-08T23:20:23.605702Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 8 23:20:23.609963 waagent[1436]: 2024-02-08T23:20:23.609889Z INFO Daemon Daemon Primary interface is [eth0] Feb 8 23:20:23.624037 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 8 23:20:23.624313 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 8 23:20:23.624387 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 8 23:20:23.624764 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:20:23.630537 systemd-networkd[1204]: eth0: DHCPv6 lease lost Feb 8 23:20:23.631917 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:20:23.632078 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:20:23.634354 systemd[1]: Starting systemd-networkd.service... Feb 8 23:20:23.665137 systemd-networkd[1493]: enP19630s1: Link UP Feb 8 23:20:23.665146 systemd-networkd[1493]: enP19630s1: Gained carrier Feb 8 23:20:23.666507 systemd-networkd[1493]: eth0: Link UP Feb 8 23:20:23.666516 systemd-networkd[1493]: eth0: Gained carrier Feb 8 23:20:23.666950 systemd-networkd[1493]: lo: Link UP Feb 8 23:20:23.666958 systemd-networkd[1493]: lo: Gained carrier Feb 8 23:20:23.667269 systemd-networkd[1493]: eth0: Gained IPv6LL Feb 8 23:20:23.667616 systemd-networkd[1493]: Enumeration completed Feb 8 23:20:23.667710 systemd[1]: Started systemd-networkd.service. Feb 8 23:20:23.670217 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:20:23.676934 waagent[1436]: 2024-02-08T23:20:23.672849Z INFO Daemon Daemon Create user account if not exists Feb 8 23:20:23.676934 waagent[1436]: 2024-02-08T23:20:23.676240Z INFO Daemon Daemon User core already exists, skip useradd Feb 8 23:20:23.678269 systemd-networkd[1493]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:20:23.679528 waagent[1436]: 2024-02-08T23:20:23.679454Z INFO Daemon Daemon Configure sudoer Feb 8 23:20:23.682342 waagent[1436]: 2024-02-08T23:20:23.682278Z INFO Daemon Daemon Configure sshd Feb 8 23:20:23.684735 waagent[1436]: 2024-02-08T23:20:23.684661Z INFO Daemon Daemon Deploy ssh public key. Feb 8 23:20:23.716527 systemd-networkd[1493]: eth0: DHCPv4 address 10.200.8.38/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 8 23:20:23.722369 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:20:25.013223 waagent[1436]: 2024-02-08T23:20:25.013122Z INFO Daemon Daemon Provisioning complete Feb 8 23:20:25.030398 waagent[1436]: 2024-02-08T23:20:25.030324Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 8 23:20:25.037680 waagent[1436]: 2024-02-08T23:20:25.031887Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 8 23:20:25.037680 waagent[1436]: 2024-02-08T23:20:25.033626Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 8 23:20:25.300738 waagent[1502]: 2024-02-08T23:20:25.300637Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 8 23:20:25.301518 waagent[1502]: 2024-02-08T23:20:25.301450Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:25.301669 waagent[1502]: 2024-02-08T23:20:25.301616Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:25.313048 waagent[1502]: 2024-02-08T23:20:25.312974Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 8 23:20:25.313208 waagent[1502]: 2024-02-08T23:20:25.313155Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 8 23:20:25.373638 waagent[1502]: 2024-02-08T23:20:25.373508Z INFO ExtHandler ExtHandler Found private key matching thumbprint 20F6F088945D2A82C32200F61EAB1023F7309EF6 Feb 8 23:20:25.373863 waagent[1502]: 2024-02-08T23:20:25.373799Z INFO ExtHandler ExtHandler Certificate with thumbprint 42AF37DF0E0D92FD6FD932B028FD69417086C43B has no matching private key. Feb 8 23:20:25.374102 waagent[1502]: 2024-02-08T23:20:25.374050Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 8 23:20:25.390319 waagent[1502]: 2024-02-08T23:20:25.390252Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 643afef3-d32b-4214-8a7d-878e2daa9d21 New eTag: 11597205628337106441] Feb 8 23:20:25.390922 waagent[1502]: 2024-02-08T23:20:25.390860Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 8 23:20:25.745653 waagent[1502]: 2024-02-08T23:20:25.745422Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 8 23:20:25.754484 waagent[1502]: 2024-02-08T23:20:25.754385Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1502 Feb 8 23:20:25.757887 waagent[1502]: 2024-02-08T23:20:25.757820Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 8 23:20:25.759138 waagent[1502]: 2024-02-08T23:20:25.759073Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 8 23:20:25.838657 waagent[1502]: 2024-02-08T23:20:25.838595Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 8 23:20:25.839081 waagent[1502]: 2024-02-08T23:20:25.839007Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 8 23:20:25.847199 waagent[1502]: 2024-02-08T23:20:25.847144Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 8 23:20:25.847694 waagent[1502]: 2024-02-08T23:20:25.847633Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 8 23:20:25.848775 waagent[1502]: 2024-02-08T23:20:25.848708Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 8 23:20:25.850059 waagent[1502]: 2024-02-08T23:20:25.850000Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 8 23:20:25.850804 waagent[1502]: 2024-02-08T23:20:25.850748Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:25.851024 waagent[1502]: 2024-02-08T23:20:25.850970Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:25.851166 waagent[1502]: 2024-02-08T23:20:25.851113Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 8 23:20:25.851804 waagent[1502]: 2024-02-08T23:20:25.851750Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:25.851885 waagent[1502]: 2024-02-08T23:20:25.851829Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:25.852142 waagent[1502]: 2024-02-08T23:20:25.852086Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 8 23:20:25.852632 waagent[1502]: 2024-02-08T23:20:25.852576Z INFO EnvHandler ExtHandler Configure routes Feb 8 23:20:25.853210 waagent[1502]: 2024-02-08T23:20:25.853152Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 8 23:20:25.853589 waagent[1502]: 2024-02-08T23:20:25.853533Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 8 23:20:25.854093 waagent[1502]: 2024-02-08T23:20:25.854040Z INFO EnvHandler ExtHandler Gateway:None Feb 8 23:20:25.854472 waagent[1502]: 2024-02-08T23:20:25.854399Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 8 23:20:25.854472 waagent[1502]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 8 23:20:25.854472 waagent[1502]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 8 23:20:25.854472 waagent[1502]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 8 23:20:25.854472 waagent[1502]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:25.854472 waagent[1502]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:25.854472 waagent[1502]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:25.854928 waagent[1502]: 2024-02-08T23:20:25.854872Z INFO EnvHandler ExtHandler Routes:None Feb 8 23:20:25.857420 waagent[1502]: 2024-02-08T23:20:25.857173Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 8 23:20:25.857980 waagent[1502]: 2024-02-08T23:20:25.857907Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 8 23:20:25.859309 waagent[1502]: 2024-02-08T23:20:25.859252Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 8 23:20:25.872674 waagent[1502]: 2024-02-08T23:20:25.872606Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 8 23:20:25.873523 waagent[1502]: 2024-02-08T23:20:25.873315Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 8 23:20:25.874779 waagent[1502]: 2024-02-08T23:20:25.874686Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 8 23:20:25.903371 waagent[1502]: 2024-02-08T23:20:25.903272Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1493' Feb 8 23:20:25.930969 waagent[1502]: 2024-02-08T23:20:25.930898Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 8 23:20:26.019954 waagent[1502]: 2024-02-08T23:20:26.019773Z INFO MonitorHandler ExtHandler Network interfaces: Feb 8 23:20:26.019954 waagent[1502]: Executing ['ip', '-a', '-o', 'link']: Feb 8 23:20:26.019954 waagent[1502]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 8 23:20:26.019954 waagent[1502]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:69:60:65 brd ff:ff:ff:ff:ff:ff Feb 8 23:20:26.019954 waagent[1502]: 3: enP19630s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:69:60:65 brd ff:ff:ff:ff:ff:ff\ altname enP19630p0s2 Feb 8 23:20:26.019954 waagent[1502]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 8 23:20:26.019954 waagent[1502]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 8 23:20:26.019954 waagent[1502]: 2: eth0 inet 10.200.8.38/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 8 23:20:26.019954 waagent[1502]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 8 23:20:26.019954 waagent[1502]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 8 23:20:26.019954 waagent[1502]: 2: eth0 inet6 fe80::20d:3aff:fe69:6065/64 scope link \ valid_lft forever preferred_lft forever Feb 8 23:20:26.267532 waagent[1502]: 2024-02-08T23:20:26.267379Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 8 23:20:26.271662 waagent[1502]: 2024-02-08T23:20:26.271532Z INFO EnvHandler ExtHandler Firewall rules: Feb 8 23:20:26.271662 waagent[1502]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:26.271662 waagent[1502]: pkts bytes target prot opt in out source destination Feb 8 23:20:26.271662 waagent[1502]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:26.271662 waagent[1502]: pkts bytes target prot opt in out source destination Feb 8 23:20:26.271662 waagent[1502]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:26.271662 waagent[1502]: pkts bytes target prot opt in out source destination Feb 8 23:20:26.271662 waagent[1502]: 4 208 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 8 23:20:26.271662 waagent[1502]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 8 23:20:26.273204 waagent[1502]: 2024-02-08T23:20:26.273145Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 8 23:20:26.291880 waagent[1502]: 2024-02-08T23:20:26.291816Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 8 23:20:27.038274 waagent[1436]: 2024-02-08T23:20:27.037943Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 8 23:20:27.043797 waagent[1436]: 2024-02-08T23:20:27.043736Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 8 23:20:28.048723 waagent[1541]: 2024-02-08T23:20:28.048605Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 8 23:20:28.049454 waagent[1541]: 2024-02-08T23:20:28.049366Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 8 23:20:28.049610 waagent[1541]: 2024-02-08T23:20:28.049551Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 8 23:20:28.059125 waagent[1541]: 2024-02-08T23:20:28.059026Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 8 23:20:28.059513 waagent[1541]: 2024-02-08T23:20:28.059456Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:28.059679 waagent[1541]: 2024-02-08T23:20:28.059630Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:28.071252 waagent[1541]: 2024-02-08T23:20:28.071183Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 8 23:20:28.083345 waagent[1541]: 2024-02-08T23:20:28.083282Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 8 23:20:28.084247 waagent[1541]: 2024-02-08T23:20:28.084187Z INFO ExtHandler Feb 8 23:20:28.084393 waagent[1541]: 2024-02-08T23:20:28.084343Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6be14ba1-a6d3-41e7-b286-483a3a9f6582 eTag: 11597205628337106441 source: Fabric] Feb 8 23:20:28.085090 waagent[1541]: 2024-02-08T23:20:28.085032Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 8 23:20:28.086173 waagent[1541]: 2024-02-08T23:20:28.086112Z INFO ExtHandler Feb 8 23:20:28.086306 waagent[1541]: 2024-02-08T23:20:28.086255Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 8 23:20:28.093266 waagent[1541]: 2024-02-08T23:20:28.093214Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 8 23:20:28.093711 waagent[1541]: 2024-02-08T23:20:28.093661Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 8 23:20:28.112341 waagent[1541]: 2024-02-08T23:20:28.112280Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 8 23:20:28.175619 waagent[1541]: 2024-02-08T23:20:28.175493Z INFO ExtHandler Downloaded certificate {'thumbprint': '42AF37DF0E0D92FD6FD932B028FD69417086C43B', 'hasPrivateKey': False} Feb 8 23:20:28.176652 waagent[1541]: 2024-02-08T23:20:28.176580Z INFO ExtHandler Downloaded certificate {'thumbprint': '20F6F088945D2A82C32200F61EAB1023F7309EF6', 'hasPrivateKey': True} Feb 8 23:20:28.177624 waagent[1541]: 2024-02-08T23:20:28.177564Z INFO ExtHandler Fetch goal state completed Feb 8 23:20:28.200844 waagent[1541]: 2024-02-08T23:20:28.200769Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1541 Feb 8 23:20:28.204107 waagent[1541]: 2024-02-08T23:20:28.204043Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 8 23:20:28.205553 waagent[1541]: 2024-02-08T23:20:28.205497Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 8 23:20:28.210580 waagent[1541]: 2024-02-08T23:20:28.210526Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 8 23:20:28.210947 waagent[1541]: 2024-02-08T23:20:28.210892Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 8 23:20:28.218948 waagent[1541]: 2024-02-08T23:20:28.218895Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 8 23:20:28.219391 waagent[1541]: 2024-02-08T23:20:28.219336Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 8 23:20:28.243773 waagent[1541]: 2024-02-08T23:20:28.243656Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 8 23:20:28.246991 waagent[1541]: 2024-02-08T23:20:28.246877Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 8 23:20:28.252730 waagent[1541]: 2024-02-08T23:20:28.252662Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 8 23:20:28.254263 waagent[1541]: 2024-02-08T23:20:28.254204Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 8 23:20:28.254608 waagent[1541]: 2024-02-08T23:20:28.254549Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:28.255017 waagent[1541]: 2024-02-08T23:20:28.254963Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:28.255586 waagent[1541]: 2024-02-08T23:20:28.255526Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 8 23:20:28.256013 waagent[1541]: 2024-02-08T23:20:28.255958Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 8 23:20:28.256662 waagent[1541]: 2024-02-08T23:20:28.256609Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 8 23:20:28.257022 waagent[1541]: 2024-02-08T23:20:28.256964Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 8 23:20:28.257022 waagent[1541]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 8 23:20:28.257022 waagent[1541]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 8 23:20:28.257022 waagent[1541]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 8 23:20:28.257022 waagent[1541]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:28.257022 waagent[1541]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:28.257022 waagent[1541]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 8 23:20:28.257307 waagent[1541]: 2024-02-08T23:20:28.257141Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 8 23:20:28.257599 waagent[1541]: 2024-02-08T23:20:28.257543Z INFO EnvHandler ExtHandler Configure routes Feb 8 23:20:28.258041 waagent[1541]: 2024-02-08T23:20:28.257981Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 8 23:20:28.260329 waagent[1541]: 2024-02-08T23:20:28.260235Z INFO EnvHandler ExtHandler Gateway:None Feb 8 23:20:28.260621 waagent[1541]: 2024-02-08T23:20:28.260563Z INFO EnvHandler ExtHandler Routes:None Feb 8 23:20:28.260975 waagent[1541]: 2024-02-08T23:20:28.260904Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 8 23:20:28.267002 waagent[1541]: 2024-02-08T23:20:28.266874Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 8 23:20:28.267249 waagent[1541]: 2024-02-08T23:20:28.267179Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 8 23:20:28.269084 waagent[1541]: 2024-02-08T23:20:28.269021Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 8 23:20:28.292088 waagent[1541]: 2024-02-08T23:20:28.292018Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 8 23:20:28.292622 waagent[1541]: 2024-02-08T23:20:28.292571Z INFO ExtHandler ExtHandler Downloading manifest Feb 8 23:20:28.293754 waagent[1541]: 2024-02-08T23:20:28.293696Z INFO MonitorHandler ExtHandler Network interfaces: Feb 8 23:20:28.293754 waagent[1541]: Executing ['ip', '-a', '-o', 'link']: Feb 8 23:20:28.293754 waagent[1541]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 8 23:20:28.293754 waagent[1541]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:69:60:65 brd ff:ff:ff:ff:ff:ff Feb 8 23:20:28.293754 waagent[1541]: 3: enP19630s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:69:60:65 brd ff:ff:ff:ff:ff:ff\ altname enP19630p0s2 Feb 8 23:20:28.293754 waagent[1541]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 8 23:20:28.293754 waagent[1541]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 8 23:20:28.293754 waagent[1541]: 2: eth0 inet 10.200.8.38/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 8 23:20:28.293754 waagent[1541]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 8 23:20:28.293754 waagent[1541]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 8 23:20:28.293754 waagent[1541]: 2: eth0 inet6 fe80::20d:3aff:fe69:6065/64 scope link \ valid_lft forever preferred_lft forever Feb 8 23:20:28.347709 waagent[1541]: 2024-02-08T23:20:28.347587Z INFO ExtHandler ExtHandler Feb 8 23:20:28.351273 waagent[1541]: 2024-02-08T23:20:28.351206Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 76b1f11c-3b23-41fa-9daf-5d848864bd43 correlation 9d780d07-12f0-42d5-9c41-31d90de8ea5e created: 2024-02-08T23:17:15.240669Z] Feb 8 23:20:28.354942 waagent[1541]: 2024-02-08T23:20:28.354814Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 8 23:20:28.357207 waagent[1541]: 2024-02-08T23:20:28.357132Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 8 23:20:28.357207 waagent[1541]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:28.357207 waagent[1541]: pkts bytes target prot opt in out source destination Feb 8 23:20:28.357207 waagent[1541]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:28.357207 waagent[1541]: pkts bytes target prot opt in out source destination Feb 8 23:20:28.357207 waagent[1541]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 8 23:20:28.357207 waagent[1541]: pkts bytes target prot opt in out source destination Feb 8 23:20:28.357207 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 8 23:20:28.357207 waagent[1541]: 103 12330 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 8 23:20:28.357207 waagent[1541]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 8 23:20:28.359411 waagent[1541]: 2024-02-08T23:20:28.359355Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 11 ms] Feb 8 23:20:28.381610 waagent[1541]: 2024-02-08T23:20:28.381546Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 8 23:20:28.392530 waagent[1541]: 2024-02-08T23:20:28.392474Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 2F53B3EC-F5B0-41CD-A872-130A3C267845;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 8 23:20:53.627471 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 8 23:20:53.650707 systemd[1]: Created slice system-sshd.slice. Feb 8 23:20:53.652358 systemd[1]: Started sshd@0-10.200.8.38:22-10.200.12.6:55694.service. Feb 8 23:20:54.535378 sshd[1580]: Accepted publickey for core from 10.200.12.6 port 55694 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:20:54.537166 sshd[1580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:54.543347 systemd[1]: Started session-3.scope. Feb 8 23:20:54.543930 systemd-logind[1333]: New session 3 of user core. Feb 8 23:20:55.076762 systemd[1]: Started sshd@1-10.200.8.38:22-10.200.12.6:55708.service. Feb 8 23:20:55.698318 sshd[1585]: Accepted publickey for core from 10.200.12.6 port 55708 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:20:55.700041 sshd[1585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:55.705327 systemd-logind[1333]: New session 4 of user core. Feb 8 23:20:55.706129 systemd[1]: Started session-4.scope. Feb 8 23:20:56.205279 sshd[1585]: pam_unix(sshd:session): session closed for user core Feb 8 23:20:56.208644 systemd[1]: sshd@1-10.200.8.38:22-10.200.12.6:55708.service: Deactivated successfully. Feb 8 23:20:56.209545 systemd[1]: session-4.scope: Deactivated successfully. Feb 8 23:20:56.210171 systemd-logind[1333]: Session 4 logged out. Waiting for processes to exit. Feb 8 23:20:56.210931 systemd-logind[1333]: Removed session 4. Feb 8 23:20:56.310441 systemd[1]: Started sshd@2-10.200.8.38:22-10.200.12.6:55718.service. Feb 8 23:20:56.923015 sshd[1591]: Accepted publickey for core from 10.200.12.6 port 55718 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:20:56.924748 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:56.930584 systemd[1]: Started session-5.scope. Feb 8 23:20:56.931308 systemd-logind[1333]: New session 5 of user core. Feb 8 23:20:57.356029 sshd[1591]: pam_unix(sshd:session): session closed for user core Feb 8 23:20:57.359078 systemd[1]: sshd@2-10.200.8.38:22-10.200.12.6:55718.service: Deactivated successfully. Feb 8 23:20:57.360162 systemd-logind[1333]: Session 5 logged out. Waiting for processes to exit. Feb 8 23:20:57.360253 systemd[1]: session-5.scope: Deactivated successfully. Feb 8 23:20:57.361324 systemd-logind[1333]: Removed session 5. Feb 8 23:20:57.460470 systemd[1]: Started sshd@3-10.200.8.38:22-10.200.12.6:57252.service. Feb 8 23:20:58.077220 sshd[1597]: Accepted publickey for core from 10.200.12.6 port 57252 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:20:58.078947 sshd[1597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:58.084078 systemd[1]: Started session-6.scope. Feb 8 23:20:58.084554 systemd-logind[1333]: New session 6 of user core. Feb 8 23:20:58.514790 sshd[1597]: pam_unix(sshd:session): session closed for user core Feb 8 23:20:58.518630 systemd[1]: sshd@3-10.200.8.38:22-10.200.12.6:57252.service: Deactivated successfully. Feb 8 23:20:58.519514 systemd[1]: session-6.scope: Deactivated successfully. Feb 8 23:20:58.520132 systemd-logind[1333]: Session 6 logged out. Waiting for processes to exit. Feb 8 23:20:58.520878 systemd-logind[1333]: Removed session 6. Feb 8 23:20:58.619090 systemd[1]: Started sshd@4-10.200.8.38:22-10.200.12.6:57260.service. Feb 8 23:20:59.230856 sshd[1603]: Accepted publickey for core from 10.200.12.6 port 57260 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:20:59.232551 sshd[1603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:20:59.237484 systemd[1]: Started session-7.scope. Feb 8 23:20:59.238080 systemd-logind[1333]: New session 7 of user core. Feb 8 23:20:59.942807 sudo[1606]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 8 23:20:59.943157 sudo[1606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:20:59.951653 dbus-daemon[1318]: \xd0mL\x81tU: received setenforce notice (enforcing=1177444736) Feb 8 23:20:59.953497 sudo[1606]: pam_unix(sudo:session): session closed for user root Feb 8 23:21:00.075619 sshd[1603]: pam_unix(sshd:session): session closed for user core Feb 8 23:21:00.079561 systemd[1]: sshd@4-10.200.8.38:22-10.200.12.6:57260.service: Deactivated successfully. Feb 8 23:21:00.080551 systemd[1]: session-7.scope: Deactivated successfully. Feb 8 23:21:00.081209 systemd-logind[1333]: Session 7 logged out. Waiting for processes to exit. Feb 8 23:21:00.082078 systemd-logind[1333]: Removed session 7. Feb 8 23:21:00.187619 systemd[1]: Started sshd@5-10.200.8.38:22-10.200.12.6:57270.service. Feb 8 23:21:00.809254 sshd[1610]: Accepted publickey for core from 10.200.12.6 port 57270 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:21:00.811098 sshd[1610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:21:00.816233 systemd[1]: Started session-8.scope. Feb 8 23:21:00.816756 systemd-logind[1333]: New session 8 of user core. Feb 8 23:21:00.850455 update_engine[1335]: I0208 23:21:00.850365 1335 update_attempter.cc:509] Updating boot flags... Feb 8 23:21:01.162386 sudo[1680]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 8 23:21:01.162659 sudo[1680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:21:01.165596 sudo[1680]: pam_unix(sudo:session): session closed for user root Feb 8 23:21:01.170072 sudo[1679]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 8 23:21:01.170335 sudo[1679]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:21:01.179063 systemd[1]: Stopping audit-rules.service... Feb 8 23:21:01.180000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:21:01.183300 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 8 23:21:01.183367 kernel: audit: type=1305 audit(1707434461.180:180): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:21:01.188597 auditctl[1683]: No rules Feb 8 23:21:01.180000 audit[1683]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbde96850 a2=420 a3=0 items=0 ppid=1 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:01.189027 systemd[1]: audit-rules.service: Deactivated successfully. Feb 8 23:21:01.189183 systemd[1]: Stopped audit-rules.service. Feb 8 23:21:01.190778 systemd[1]: Starting audit-rules.service... Feb 8 23:21:01.205970 kernel: audit: type=1300 audit(1707434461.180:180): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbde96850 a2=420 a3=0 items=0 ppid=1 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:01.180000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:21:01.211032 kernel: audit: type=1327 audit(1707434461.180:180): proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:21:01.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.212483 augenrules[1700]: No rules Feb 8 23:21:01.213194 systemd[1]: Finished audit-rules.service. Feb 8 23:21:01.215311 sudo[1679]: pam_unix(sudo:session): session closed for user root Feb 8 23:21:01.221975 kernel: audit: type=1131 audit(1707434461.188:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.222037 kernel: audit: type=1130 audit(1707434461.210:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.233456 kernel: audit: type=1106 audit(1707434461.210:183): pid=1679 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.210000 audit[1679]: USER_END pid=1679 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.210000 audit[1679]: CRED_DISP pid=1679 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.246445 kernel: audit: type=1104 audit(1707434461.210:184): pid=1679 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.314866 sshd[1610]: pam_unix(sshd:session): session closed for user core Feb 8 23:21:01.316000 audit[1610]: USER_END pid=1610 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:01.318571 systemd[1]: sshd@5-10.200.8.38:22-10.200.12.6:57270.service: Deactivated successfully. Feb 8 23:21:01.319422 systemd[1]: session-8.scope: Deactivated successfully. Feb 8 23:21:01.320872 systemd-logind[1333]: Session 8 logged out. Waiting for processes to exit. Feb 8 23:21:01.321778 systemd-logind[1333]: Removed session 8. Feb 8 23:21:01.316000 audit[1610]: CRED_DISP pid=1610 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:01.345689 kernel: audit: type=1106 audit(1707434461.316:185): pid=1610 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:01.345751 kernel: audit: type=1104 audit(1707434461.316:186): pid=1610 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:01.345773 kernel: audit: type=1131 audit(1707434461.316:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.38:22-10.200.12.6:57270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.38:22-10.200.12.6:57270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:01.422480 systemd[1]: Started sshd@6-10.200.8.38:22-10.200.12.6:57272.service. Feb 8 23:21:01.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.12.6:57272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:02.043000 audit[1706]: USER_ACCT pid=1706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:02.044164 sshd[1706]: Accepted publickey for core from 10.200.12.6 port 57272 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:21:02.044000 audit[1706]: CRED_ACQ pid=1706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:02.044000 audit[1706]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd348dc220 a2=3 a3=0 items=0 ppid=1 pid=1706 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:02.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:21:02.045755 sshd[1706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:21:02.050541 systemd[1]: Started session-9.scope. Feb 8 23:21:02.050981 systemd-logind[1333]: New session 9 of user core. Feb 8 23:21:02.054000 audit[1706]: USER_START pid=1706 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:02.056000 audit[1708]: CRED_ACQ pid=1708 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:02.387000 audit[1709]: USER_ACCT pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:02.387000 audit[1709]: CRED_REFR pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:02.388100 sudo[1709]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 8 23:21:02.388451 sudo[1709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:21:02.390000 audit[1709]: USER_START pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:03.373271 systemd[1]: Starting docker.service... Feb 8 23:21:03.431279 env[1724]: time="2024-02-08T23:21:03.431217409Z" level=info msg="Starting up" Feb 8 23:21:03.432538 env[1724]: time="2024-02-08T23:21:03.432511812Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 8 23:21:03.432683 env[1724]: time="2024-02-08T23:21:03.432670612Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 8 23:21:03.432744 env[1724]: time="2024-02-08T23:21:03.432732112Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 8 23:21:03.432786 env[1724]: time="2024-02-08T23:21:03.432778012Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 8 23:21:03.434867 env[1724]: time="2024-02-08T23:21:03.434839916Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 8 23:21:03.434867 env[1724]: time="2024-02-08T23:21:03.434856316Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 8 23:21:03.435015 env[1724]: time="2024-02-08T23:21:03.434874116Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 8 23:21:03.435015 env[1724]: time="2024-02-08T23:21:03.434886816Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 8 23:21:03.441500 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3664561190-merged.mount: Deactivated successfully. Feb 8 23:21:03.502162 env[1724]: time="2024-02-08T23:21:03.502132334Z" level=info msg="Loading containers: start." Feb 8 23:21:03.544000 audit[1750]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.544000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe5d901420 a2=0 a3=7ffe5d90140c items=0 ppid=1724 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 8 23:21:03.546000 audit[1752]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.546000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffddbdd4b0 a2=0 a3=7fffddbdd49c items=0 ppid=1724 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.546000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 8 23:21:03.548000 audit[1754]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.548000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc5922fb80 a2=0 a3=7ffc5922fb6c items=0 ppid=1724 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.548000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 8 23:21:03.549000 audit[1756]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.549000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffecee3d8c0 a2=0 a3=7ffecee3d8ac items=0 ppid=1724 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 8 23:21:03.551000 audit[1758]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.551000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2fff48f0 a2=0 a3=7fff2fff48dc items=0 ppid=1724 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.551000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 8 23:21:03.553000 audit[1760]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.553000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6542e340 a2=0 a3=7fff6542e32c items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.553000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 8 23:21:03.570000 audit[1762]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.570000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed5c572c0 a2=0 a3=7ffed5c572ac items=0 ppid=1724 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 8 23:21:03.572000 audit[1764]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.572000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffef02e8c70 a2=0 a3=7ffef02e8c5c items=0 ppid=1724 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 8 23:21:03.573000 audit[1766]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.573000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc2a706580 a2=0 a3=7ffc2a70656c items=0 ppid=1724 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 8 23:21:03.592000 audit[1770]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.592000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5c59b920 a2=0 a3=7ffc5c59b90c items=0 ppid=1724 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 8 23:21:03.593000 audit[1771]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.593000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffee8a557d0 a2=0 a3=7ffee8a557bc items=0 ppid=1724 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 8 23:21:03.620449 kernel: Initializing XFRM netlink socket Feb 8 23:21:03.644915 env[1724]: time="2024-02-08T23:21:03.643174182Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 8 23:21:03.730000 audit[1778]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.730000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffef2e3b300 a2=0 a3=7ffef2e3b2ec items=0 ppid=1724 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 8 23:21:03.740000 audit[1781]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.740000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc2372c450 a2=0 a3=7ffc2372c43c items=0 ppid=1724 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 8 23:21:03.743000 audit[1784]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.743000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd78649b90 a2=0 a3=7ffd78649b7c items=0 ppid=1724 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 8 23:21:03.745000 audit[1786]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.745000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffdfad32a0 a2=0 a3=7fffdfad328c items=0 ppid=1724 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 8 23:21:03.747000 audit[1788]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.747000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff023d7c90 a2=0 a3=7fff023d7c7c items=0 ppid=1724 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 8 23:21:03.749000 audit[1790]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.749000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffdc5a4fd0 a2=0 a3=7fffdc5a4fbc items=0 ppid=1724 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 8 23:21:03.751000 audit[1792]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.751000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc888eb400 a2=0 a3=7ffc888eb3ec items=0 ppid=1724 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 8 23:21:03.753000 audit[1794]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.753000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc25195ee0 a2=0 a3=7ffc25195ecc items=0 ppid=1724 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 8 23:21:03.755000 audit[1796]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.755000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff9926ae30 a2=0 a3=7fff9926ae1c items=0 ppid=1724 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 8 23:21:03.757000 audit[1798]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.757000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe11213600 a2=0 a3=7ffe112135ec items=0 ppid=1724 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 8 23:21:03.759000 audit[1800]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.759000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeecdd0c70 a2=0 a3=7ffeecdd0c5c items=0 ppid=1724 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 8 23:21:03.760244 systemd-networkd[1493]: docker0: Link UP Feb 8 23:21:03.776000 audit[1804]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.776000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8a5a0e50 a2=0 a3=7ffc8a5a0e3c items=0 ppid=1724 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 8 23:21:03.778000 audit[1805]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:03.778000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc043e2810 a2=0 a3=7ffc043e27fc items=0 ppid=1724 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:03.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 8 23:21:03.778950 env[1724]: time="2024-02-08T23:21:03.778910621Z" level=info msg="Loading containers: done." Feb 8 23:21:03.813829 env[1724]: time="2024-02-08T23:21:03.813783683Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 8 23:21:03.814031 env[1724]: time="2024-02-08T23:21:03.814004783Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 8 23:21:03.814163 env[1724]: time="2024-02-08T23:21:03.814138183Z" level=info msg="Daemon has completed initialization" Feb 8 23:21:03.843353 systemd[1]: Started docker.service. Feb 8 23:21:03.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:03.854241 env[1724]: time="2024-02-08T23:21:03.854201054Z" level=info msg="API listen on /run/docker.sock" Feb 8 23:21:03.871456 systemd[1]: Reloading. Feb 8 23:21:03.951919 /usr/lib/systemd/system-generators/torcx-generator[1853]: time="2024-02-08T23:21:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:21:03.951956 /usr/lib/systemd/system-generators/torcx-generator[1853]: time="2024-02-08T23:21:03Z" level=info msg="torcx already run" Feb 8 23:21:04.040550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:21:04.040570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:21:04.058441 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:21:04.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit: BPF prog-id=38 op=LOAD Feb 8 23:21:04.122000 audit: BPF prog-id=31 op=UNLOAD Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.122000 audit: BPF prog-id=39 op=LOAD Feb 8 23:21:04.123000 audit: BPF prog-id=35 op=UNLOAD Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit: BPF prog-id=40 op=LOAD Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.125000 audit: BPF prog-id=41 op=LOAD Feb 8 23:21:04.125000 audit: BPF prog-id=24 op=UNLOAD Feb 8 23:21:04.125000 audit: BPF prog-id=25 op=UNLOAD Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.127000 audit: BPF prog-id=42 op=LOAD Feb 8 23:21:04.127000 audit: BPF prog-id=21 op=UNLOAD Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit: BPF prog-id=43 op=LOAD Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.128000 audit: BPF prog-id=44 op=LOAD Feb 8 23:21:04.128000 audit: BPF prog-id=22 op=UNLOAD Feb 8 23:21:04.128000 audit: BPF prog-id=23 op=UNLOAD Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.129000 audit: BPF prog-id=45 op=LOAD Feb 8 23:21:04.129000 audit: BPF prog-id=37 op=UNLOAD Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.131000 audit: BPF prog-id=46 op=LOAD Feb 8 23:21:04.131000 audit: BPF prog-id=32 op=UNLOAD Feb 8 23:21:04.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit: BPF prog-id=47 op=LOAD Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.132000 audit: BPF prog-id=48 op=LOAD Feb 8 23:21:04.132000 audit: BPF prog-id=33 op=UNLOAD Feb 8 23:21:04.132000 audit: BPF prog-id=34 op=UNLOAD Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.133000 audit: BPF prog-id=49 op=LOAD Feb 8 23:21:04.133000 audit: BPF prog-id=30 op=UNLOAD Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit: BPF prog-id=50 op=LOAD Feb 8 23:21:04.135000 audit: BPF prog-id=27 op=UNLOAD Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit: BPF prog-id=51 op=LOAD Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:04.135000 audit: BPF prog-id=52 op=LOAD Feb 8 23:21:04.135000 audit: BPF prog-id=28 op=UNLOAD Feb 8 23:21:04.135000 audit: BPF prog-id=29 op=UNLOAD Feb 8 23:21:04.147212 systemd[1]: Started kubelet.service. Feb 8 23:21:04.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:04.227535 kubelet[1914]: E0208 23:21:04.227408 1914 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:21:04.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:21:04.232080 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:21:04.232242 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:21:08.551535 env[1351]: time="2024-02-08T23:21:08.551470523Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 8 23:21:09.205410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3506494365.mount: Deactivated successfully. Feb 8 23:21:11.159449 env[1351]: time="2024-02-08T23:21:11.159367379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:11.166278 env[1351]: time="2024-02-08T23:21:11.166152986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:11.172907 env[1351]: time="2024-02-08T23:21:11.172872393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:11.176016 env[1351]: time="2024-02-08T23:21:11.175977896Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:11.176673 env[1351]: time="2024-02-08T23:21:11.176642197Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 8 23:21:11.186653 env[1351]: time="2024-02-08T23:21:11.186620007Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 8 23:21:13.057884 env[1351]: time="2024-02-08T23:21:13.057760839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:13.065671 env[1351]: time="2024-02-08T23:21:13.065629894Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:13.075200 env[1351]: time="2024-02-08T23:21:13.075092000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:13.081137 env[1351]: time="2024-02-08T23:21:13.081095394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:13.081778 env[1351]: time="2024-02-08T23:21:13.081736915Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 8 23:21:13.093083 env[1351]: time="2024-02-08T23:21:13.093052180Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 8 23:21:14.289466 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 8 23:21:14.289758 systemd[1]: Stopped kubelet.service. Feb 8 23:21:14.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.291561 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 8 23:21:14.291600 kernel: audit: type=1130 audit(1707434474.289:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.309500 systemd[1]: Started kubelet.service. Feb 8 23:21:14.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.335452 kernel: audit: type=1131 audit(1707434474.289:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.335542 kernel: audit: type=1130 audit(1707434474.309:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:14.382581 kubelet[1944]: E0208 23:21:14.382532 1944 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:21:14.385646 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:21:14.385812 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:21:14.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:21:14.397451 env[1351]: time="2024-02-08T23:21:14.396917187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:14.401451 kernel: audit: type=1131 audit(1707434474.385:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:21:14.402914 env[1351]: time="2024-02-08T23:21:14.402875074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:14.408017 env[1351]: time="2024-02-08T23:21:14.407982934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:14.413349 env[1351]: time="2024-02-08T23:21:14.413315102Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:14.414013 env[1351]: time="2024-02-08T23:21:14.413982223Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 8 23:21:14.424310 env[1351]: time="2024-02-08T23:21:14.424276747Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 8 23:21:15.471972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3055551778.mount: Deactivated successfully. Feb 8 23:21:16.032158 env[1351]: time="2024-02-08T23:21:16.032099571Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.036248 env[1351]: time="2024-02-08T23:21:16.036207293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.039982 env[1351]: time="2024-02-08T23:21:16.039949804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.042510 env[1351]: time="2024-02-08T23:21:16.042477979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.042947 env[1351]: time="2024-02-08T23:21:16.042917092Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 8 23:21:16.052636 env[1351]: time="2024-02-08T23:21:16.052609681Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 8 23:21:16.446015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1915862153.mount: Deactivated successfully. Feb 8 23:21:16.468066 env[1351]: time="2024-02-08T23:21:16.468010028Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.476022 env[1351]: time="2024-02-08T23:21:16.475958865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.480638 env[1351]: time="2024-02-08T23:21:16.480558701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.486144 env[1351]: time="2024-02-08T23:21:16.486046264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:16.486758 env[1351]: time="2024-02-08T23:21:16.486724685Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 8 23:21:16.501479 env[1351]: time="2024-02-08T23:21:16.501452322Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 8 23:21:16.983259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3402520603.mount: Deactivated successfully. Feb 8 23:21:21.456843 env[1351]: time="2024-02-08T23:21:21.456780368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:21.464992 env[1351]: time="2024-02-08T23:21:21.464893178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:21.468943 env[1351]: time="2024-02-08T23:21:21.468853080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:21.473860 env[1351]: time="2024-02-08T23:21:21.473829009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:21.474556 env[1351]: time="2024-02-08T23:21:21.474520327Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 8 23:21:21.484696 env[1351]: time="2024-02-08T23:21:21.484668190Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 8 23:21:22.017931 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1450500484.mount: Deactivated successfully. Feb 8 23:21:22.677421 env[1351]: time="2024-02-08T23:21:22.677301595Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:22.685664 env[1351]: time="2024-02-08T23:21:22.685586304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:22.688793 env[1351]: time="2024-02-08T23:21:22.688757284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:22.691509 env[1351]: time="2024-02-08T23:21:22.691474052Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:22.691953 env[1351]: time="2024-02-08T23:21:22.691917663Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 8 23:21:24.539452 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 8 23:21:24.539722 systemd[1]: Stopped kubelet.service. Feb 8 23:21:24.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.556456 kernel: audit: type=1130 audit(1707434484.538:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.556505 systemd[1]: Started kubelet.service. Feb 8 23:21:24.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.590448 kernel: audit: type=1131 audit(1707434484.538:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.590543 kernel: audit: type=1130 audit(1707434484.555:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.652059 kubelet[2028]: E0208 23:21:24.652009 2028 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:21:24.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:21:24.654669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:21:24.654828 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:21:24.671458 kernel: audit: type=1131 audit(1707434484.653:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:21:24.986103 systemd[1]: Stopped kubelet.service. Feb 8 23:21:24.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:24.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:25.004172 systemd[1]: Reloading. Feb 8 23:21:25.015738 kernel: audit: type=1130 audit(1707434484.985:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:25.015827 kernel: audit: type=1131 audit(1707434484.985:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:25.089044 /usr/lib/systemd/system-generators/torcx-generator[2058]: time="2024-02-08T23:21:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:21:25.089086 /usr/lib/systemd/system-generators/torcx-generator[2058]: time="2024-02-08T23:21:25Z" level=info msg="torcx already run" Feb 8 23:21:25.175498 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:21:25.175518 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:21:25.193297 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.272452 kernel: audit: type=1400 audit(1707434485.256:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.302000 kernel: audit: type=1400 audit(1707434485.256:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.302079 kernel: audit: type=1400 audit(1707434485.256:408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.302102 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.256000 audit: BPF prog-id=53 op=LOAD Feb 8 23:21:25.256000 audit: BPF prog-id=38 op=UNLOAD Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.270000 audit: BPF prog-id=54 op=LOAD Feb 8 23:21:25.270000 audit: BPF prog-id=39 op=UNLOAD Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit: BPF prog-id=55 op=LOAD Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.273000 audit: BPF prog-id=56 op=LOAD Feb 8 23:21:25.273000 audit: BPF prog-id=40 op=UNLOAD Feb 8 23:21:25.273000 audit: BPF prog-id=41 op=UNLOAD Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit: BPF prog-id=57 op=LOAD Feb 8 23:21:25.287000 audit: BPF prog-id=42 op=UNLOAD Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.300000 audit: BPF prog-id=58 op=LOAD Feb 8 23:21:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit: BPF prog-id=59 op=LOAD Feb 8 23:21:25.305000 audit: BPF prog-id=43 op=UNLOAD Feb 8 23:21:25.305000 audit: BPF prog-id=44 op=UNLOAD Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.306000 audit: BPF prog-id=60 op=LOAD Feb 8 23:21:25.306000 audit: BPF prog-id=45 op=UNLOAD Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.307000 audit: BPF prog-id=61 op=LOAD Feb 8 23:21:25.308000 audit: BPF prog-id=46 op=UNLOAD Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit: BPF prog-id=62 op=LOAD Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.308000 audit: BPF prog-id=63 op=LOAD Feb 8 23:21:25.308000 audit: BPF prog-id=47 op=UNLOAD Feb 8 23:21:25.308000 audit: BPF prog-id=48 op=UNLOAD Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.309000 audit: BPF prog-id=64 op=LOAD Feb 8 23:21:25.309000 audit: BPF prog-id=49 op=UNLOAD Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit: BPF prog-id=65 op=LOAD Feb 8 23:21:25.311000 audit: BPF prog-id=50 op=UNLOAD Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit: BPF prog-id=66 op=LOAD Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.311000 audit: BPF prog-id=67 op=LOAD Feb 8 23:21:25.311000 audit: BPF prog-id=51 op=UNLOAD Feb 8 23:21:25.311000 audit: BPF prog-id=52 op=UNLOAD Feb 8 23:21:25.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:25.329854 systemd[1]: Started kubelet.service. Feb 8 23:21:25.376675 kubelet[2120]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:21:25.376675 kubelet[2120]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 8 23:21:25.376675 kubelet[2120]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:21:25.377177 kubelet[2120]: I0208 23:21:25.376731 2120 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 8 23:21:25.729015 kubelet[2120]: I0208 23:21:25.728972 2120 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 8 23:21:25.729015 kubelet[2120]: I0208 23:21:25.729000 2120 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 8 23:21:25.729300 kubelet[2120]: I0208 23:21:25.729277 2120 server.go:895] "Client rotation is on, will bootstrap in background" Feb 8 23:21:25.733706 kubelet[2120]: E0208 23:21:25.733684 2120 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.38:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.733887 kubelet[2120]: I0208 23:21:25.733866 2120 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:21:25.742873 kubelet[2120]: I0208 23:21:25.742846 2120 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 8 23:21:25.743065 kubelet[2120]: I0208 23:21:25.743050 2120 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 8 23:21:25.743216 kubelet[2120]: I0208 23:21:25.743198 2120 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 8 23:21:25.743355 kubelet[2120]: I0208 23:21:25.743226 2120 topology_manager.go:138] "Creating topology manager with none policy" Feb 8 23:21:25.743355 kubelet[2120]: I0208 23:21:25.743236 2120 container_manager_linux.go:301] "Creating device plugin manager" Feb 8 23:21:25.743355 kubelet[2120]: I0208 23:21:25.743340 2120 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:21:25.743488 kubelet[2120]: I0208 23:21:25.743442 2120 kubelet.go:393] "Attempting to sync node with API server" Feb 8 23:21:25.743488 kubelet[2120]: I0208 23:21:25.743458 2120 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 8 23:21:25.743581 kubelet[2120]: I0208 23:21:25.743490 2120 kubelet.go:309] "Adding apiserver pod source" Feb 8 23:21:25.743581 kubelet[2120]: I0208 23:21:25.743511 2120 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 8 23:21:25.745530 kubelet[2120]: I0208 23:21:25.745508 2120 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 8 23:21:25.745765 kubelet[2120]: W0208 23:21:25.745745 2120 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 8 23:21:25.746186 kubelet[2120]: I0208 23:21:25.746163 2120 server.go:1232] "Started kubelet" Feb 8 23:21:25.746317 kubelet[2120]: W0208 23:21:25.746276 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a74a3a29e1&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.746381 kubelet[2120]: E0208 23:21:25.746337 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a74a3a29e1&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.745000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:25.745000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00057ced0 a1=c000720540 a2=c00057cea0 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.745000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:25.746000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.746000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:25.746000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006106c0 a1=c000720558 a2=c00057cf60 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.746000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:25.748020 kubelet[2120]: I0208 23:21:25.747493 2120 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 8 23:21:25.748020 kubelet[2120]: I0208 23:21:25.747547 2120 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 8 23:21:25.748020 kubelet[2120]: I0208 23:21:25.747639 2120 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 8 23:21:25.751386 kubelet[2120]: E0208 23:21:25.751362 2120 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 8 23:21:25.751503 kubelet[2120]: E0208 23:21:25.751409 2120 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 8 23:21:25.751717 kubelet[2120]: W0208 23:21:25.751669 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.751787 kubelet[2120]: E0208 23:21:25.751727 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.753000 audit[2131]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.753000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9afd1b20 a2=0 a3=7ffc9afd1b0c items=0 ppid=2120 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.754982 kubelet[2120]: I0208 23:21:25.754891 2120 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 8 23:21:25.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:21:25.755962 kubelet[2120]: I0208 23:21:25.755937 2120 server.go:462] "Adding debug handlers to kubelet server" Feb 8 23:21:25.754000 audit[2132]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.754000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1d1e9b20 a2=0 a3=7ffd1d1e9b0c items=0 ppid=2120 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:21:25.757638 kubelet[2120]: I0208 23:21:25.757614 2120 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 8 23:21:25.757844 kubelet[2120]: I0208 23:21:25.757823 2120 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 8 23:21:25.758268 kubelet[2120]: I0208 23:21:25.758244 2120 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 8 23:21:25.758749 kubelet[2120]: E0208 23:21:25.758734 2120 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a74a3a29e1?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="200ms" Feb 8 23:21:25.759027 kubelet[2120]: E0208 23:21:25.758914 2120 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a74a3a29e1.17b2069e50269bc4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a74a3a29e1", UID:"ci-3510.3.2-a-a74a3a29e1", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a74a3a29e1"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 21, 25, 746146244, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 21, 25, 746146244, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-a74a3a29e1"}': 'Post "https://10.200.8.38:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.38:6443: connect: connection refused'(may retry after sleeping) Feb 8 23:21:25.760806 kubelet[2120]: I0208 23:21:25.760792 2120 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 8 23:21:25.761313 kubelet[2120]: W0208 23:21:25.761274 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.761478 kubelet[2120]: E0208 23:21:25.761424 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.760000 audit[2134]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.760000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd000b4bd0 a2=0 a3=7ffd000b4bbc items=0 ppid=2120 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:21:25.763122 kubelet[2120]: I0208 23:21:25.763099 2120 reconciler_new.go:29] "Reconciler: start to sync state" Feb 8 23:21:25.762000 audit[2136]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.762000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe703e4e90 a2=0 a3=7ffe703e4e7c items=0 ppid=2120 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:21:25.768000 audit[2139]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.768000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffee28243f0 a2=0 a3=7ffee28243dc items=0 ppid=2120 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 8 23:21:25.771400 kubelet[2120]: I0208 23:21:25.770361 2120 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 8 23:21:25.770000 audit[2140]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:25.770000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd74da1a40 a2=0 a3=7ffd74da1a2c items=0 ppid=2120 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:21:25.772631 kubelet[2120]: I0208 23:21:25.772620 2120 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 8 23:21:25.772680 kubelet[2120]: I0208 23:21:25.772646 2120 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 8 23:21:25.772680 kubelet[2120]: I0208 23:21:25.772664 2120 kubelet.go:2303] "Starting kubelet main sync loop" Feb 8 23:21:25.772764 kubelet[2120]: E0208 23:21:25.772711 2120 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 8 23:21:25.776000 audit[2142]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.776000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71fe9110 a2=0 a3=7ffd71fe90fc items=0 ppid=2120 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:21:25.778000 audit[2143]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.778000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed4c53ae0 a2=0 a3=7ffed4c53acc items=0 ppid=2120 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:21:25.779000 audit[2144]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:25.779000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d4728e0 a2=0 a3=7ffd2d4728cc items=0 ppid=2120 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:21:25.780000 audit[2145]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:25.780000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff83078790 a2=0 a3=7fff8307877c items=0 ppid=2120 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:21:25.781000 audit[2146]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:25.781000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc830305b0 a2=0 a3=7ffc8303059c items=0 ppid=2120 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:21:25.782000 audit[2147]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:25.782000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc2c55a90 a2=0 a3=7fffc2c55a7c items=0 ppid=2120 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:21:25.784298 kubelet[2120]: W0208 23:21:25.784265 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.784386 kubelet[2120]: E0208 23:21:25.784304 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:25.851144 kubelet[2120]: I0208 23:21:25.851111 2120 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 8 23:21:25.851144 kubelet[2120]: I0208 23:21:25.851132 2120 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 8 23:21:25.851336 kubelet[2120]: I0208 23:21:25.851156 2120 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:21:25.856846 kubelet[2120]: I0208 23:21:25.856788 2120 policy_none.go:49] "None policy: Start" Feb 8 23:21:25.857395 kubelet[2120]: I0208 23:21:25.857375 2120 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 8 23:21:25.857522 kubelet[2120]: I0208 23:21:25.857399 2120 state_mem.go:35] "Initializing new in-memory state store" Feb 8 23:21:25.859864 kubelet[2120]: I0208 23:21:25.859845 2120 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:25.860150 kubelet[2120]: E0208 23:21:25.860121 2120 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:25.865116 systemd[1]: Created slice kubepods.slice. Feb 8 23:21:25.869724 systemd[1]: Created slice kubepods-burstable.slice. Feb 8 23:21:25.873097 systemd[1]: Created slice kubepods-besteffort.slice. Feb 8 23:21:25.873598 kubelet[2120]: E0208 23:21:25.873331 2120 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 8 23:21:25.881023 kubelet[2120]: I0208 23:21:25.881007 2120 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 8 23:21:25.879000 audit[2120]: AVC avc: denied { mac_admin } for pid=2120 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:25.879000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:25.879000 audit[2120]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6bd40 a1=c000cdfe18 a2=c000c6bd10 a3=25 items=0 ppid=1 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:25.879000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:25.881709 kubelet[2120]: I0208 23:21:25.881268 2120 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 8 23:21:25.881709 kubelet[2120]: I0208 23:21:25.881479 2120 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 8 23:21:25.882438 kubelet[2120]: E0208 23:21:25.882217 2120 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-a74a3a29e1\" not found" Feb 8 23:21:25.959857 kubelet[2120]: E0208 23:21:25.959820 2120 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a74a3a29e1?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="400ms" Feb 8 23:21:26.062365 kubelet[2120]: I0208 23:21:26.062329 2120 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.062806 kubelet[2120]: E0208 23:21:26.062785 2120 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.074400 kubelet[2120]: I0208 23:21:26.074359 2120 topology_manager.go:215] "Topology Admit Handler" podUID="233be0881e49b813e7087c6ba89bd123" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.075930 kubelet[2120]: I0208 23:21:26.075908 2120 topology_manager.go:215] "Topology Admit Handler" podUID="52e13694d34913c0b2896598512bd05c" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.077294 kubelet[2120]: I0208 23:21:26.077277 2120 topology_manager.go:215] "Topology Admit Handler" podUID="d399d9cbb3bb538b0a6ee6903f512c3f" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.083036 systemd[1]: Created slice kubepods-burstable-pod233be0881e49b813e7087c6ba89bd123.slice. Feb 8 23:21:26.094891 systemd[1]: Created slice kubepods-burstable-podd399d9cbb3bb538b0a6ee6903f512c3f.slice. Feb 8 23:21:26.099377 systemd[1]: Created slice kubepods-burstable-pod52e13694d34913c0b2896598512bd05c.slice. Feb 8 23:21:26.165230 kubelet[2120]: I0208 23:21:26.165181 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/52e13694d34913c0b2896598512bd05c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-a74a3a29e1\" (UID: \"52e13694d34913c0b2896598512bd05c\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165230 kubelet[2120]: I0208 23:21:26.165238 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165522 kubelet[2120]: I0208 23:21:26.165275 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165522 kubelet[2120]: I0208 23:21:26.165306 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165522 kubelet[2120]: I0208 23:21:26.165336 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165522 kubelet[2120]: I0208 23:21:26.165371 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165522 kubelet[2120]: I0208 23:21:26.165401 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165735 kubelet[2120]: I0208 23:21:26.165470 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.165735 kubelet[2120]: I0208 23:21:26.165513 2120 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.360913 kubelet[2120]: E0208 23:21:26.360802 2120 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a74a3a29e1?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="800ms" Feb 8 23:21:26.394456 env[1351]: time="2024-02-08T23:21:26.394371767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-a74a3a29e1,Uid:233be0881e49b813e7087c6ba89bd123,Namespace:kube-system,Attempt:0,}" Feb 8 23:21:26.398883 env[1351]: time="2024-02-08T23:21:26.398840168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-a74a3a29e1,Uid:d399d9cbb3bb538b0a6ee6903f512c3f,Namespace:kube-system,Attempt:0,}" Feb 8 23:21:26.403723 env[1351]: time="2024-02-08T23:21:26.403688578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-a74a3a29e1,Uid:52e13694d34913c0b2896598512bd05c,Namespace:kube-system,Attempt:0,}" Feb 8 23:21:26.464623 kubelet[2120]: I0208 23:21:26.464588 2120 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.465094 kubelet[2120]: E0208 23:21:26.464969 2120 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:26.589569 kubelet[2120]: W0208 23:21:26.589498 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:26.589569 kubelet[2120]: E0208 23:21:26.589571 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:26.831786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3095799093.mount: Deactivated successfully. Feb 8 23:21:26.863512 env[1351]: time="2024-02-08T23:21:26.863451676Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.867212 env[1351]: time="2024-02-08T23:21:26.867160260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.882712 env[1351]: time="2024-02-08T23:21:26.882673611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.888250 env[1351]: time="2024-02-08T23:21:26.888217436Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.898120 env[1351]: time="2024-02-08T23:21:26.898087859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.901958 env[1351]: time="2024-02-08T23:21:26.901925746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.905756 env[1351]: time="2024-02-08T23:21:26.905725232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.909472 env[1351]: time="2024-02-08T23:21:26.909444616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.915120 env[1351]: time="2024-02-08T23:21:26.915085944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.926073 env[1351]: time="2024-02-08T23:21:26.926039492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.932849 env[1351]: time="2024-02-08T23:21:26.932818745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.937995 env[1351]: time="2024-02-08T23:21:26.937963361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:21:26.974843 env[1351]: time="2024-02-08T23:21:26.974769794Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:21:26.974843 env[1351]: time="2024-02-08T23:21:26.974809295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:21:26.975088 env[1351]: time="2024-02-08T23:21:26.974823895Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:21:26.975088 env[1351]: time="2024-02-08T23:21:26.974953998Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1161fca7e8a8267b4d55ad862c0908af03bafc20d486dfb8c587c6cd2d58ac92 pid=2158 runtime=io.containerd.runc.v2 Feb 8 23:21:26.999128 systemd[1]: Started cri-containerd-1161fca7e8a8267b4d55ad862c0908af03bafc20d486dfb8c587c6cd2d58ac92.scope. Feb 8 23:21:27.008054 env[1351]: time="2024-02-08T23:21:27.001908407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:21:27.008054 env[1351]: time="2024-02-08T23:21:27.001956108Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:21:27.008054 env[1351]: time="2024-02-08T23:21:27.001971109Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:21:27.008054 env[1351]: time="2024-02-08T23:21:27.002108812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1d39d224a8158933a60d7a6683ceeac39c48593d90c68da9b0312c943649d38 pid=2181 runtime=io.containerd.runc.v2 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit: BPF prog-id=68 op=LOAD Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131363166636137653861383236376234643535616438363263303930 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131363166636137653861383236376234643535616438363263303930 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.019000 audit: BPF prog-id=69 op=LOAD Feb 8 23:21:27.019000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d8780 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131363166636137653861383236376234643535616438363263303930 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.021000 audit: BPF prog-id=70 op=LOAD Feb 8 23:21:27.021000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d87c8 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131363166636137653861383236376234643535616438363263303930 Feb 8 23:21:27.022000 audit: BPF prog-id=70 op=UNLOAD Feb 8 23:21:27.022000 audit: BPF prog-id=69 op=UNLOAD Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.022000 audit: BPF prog-id=71 op=LOAD Feb 8 23:21:27.022000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8bd8 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131363166636137653861383236376234643535616438363263303930 Feb 8 23:21:27.033451 env[1351]: time="2024-02-08T23:21:27.033380400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:21:27.033551 env[1351]: time="2024-02-08T23:21:27.033462802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:21:27.033551 env[1351]: time="2024-02-08T23:21:27.033493603Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:21:27.034633 env[1351]: time="2024-02-08T23:21:27.034343322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d42301e6c00d320c5893e3883fd5f76150b3fc99a8419a79b072f9792980bfe2 pid=2216 runtime=io.containerd.runc.v2 Feb 8 23:21:27.037376 systemd[1]: Started cri-containerd-a1d39d224a8158933a60d7a6683ceeac39c48593d90c68da9b0312c943649d38.scope. Feb 8 23:21:27.048817 kubelet[2120]: W0208 23:21:27.048681 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.048817 kubelet[2120]: E0208 23:21:27.048766 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.055028 systemd[1]: Started cri-containerd-d42301e6c00d320c5893e3883fd5f76150b3fc99a8419a79b072f9792980bfe2.scope. Feb 8 23:21:27.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.058000 audit: BPF prog-id=72 op=LOAD Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2181 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643339643232346138313538393333613630643761363638336365 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2181 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643339643232346138313538393333613630643761363638336365 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit: BPF prog-id=73 op=LOAD Feb 8 23:21:27.059000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8690 items=0 ppid=2181 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643339643232346138313538393333613630643761363638336365 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit: BPF prog-id=74 op=LOAD Feb 8 23:21:27.059000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c86d8 items=0 ppid=2181 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643339643232346138313538393333613630643761363638336365 Feb 8 23:21:27.059000 audit: BPF prog-id=74 op=UNLOAD Feb 8 23:21:27.059000 audit: BPF prog-id=73 op=UNLOAD Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.059000 audit: BPF prog-id=75 op=LOAD Feb 8 23:21:27.059000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8ae8 items=0 ppid=2181 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643339643232346138313538393333613630643761363638336365 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.083000 audit: BPF prog-id=76 op=LOAD Feb 8 23:21:27.091067 kubelet[2120]: W0208 23:21:27.090938 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a74a3a29e1&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.091067 kubelet[2120]: E0208 23:21:27.091018 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a74a3a29e1&limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2216 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323330316536633030643332306335383933653338383366643566 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2216 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323330316536633030643332306335383933653338383366643566 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.090000 audit: BPF prog-id=77 op=LOAD Feb 8 23:21:27.090000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300350 items=0 ppid=2216 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323330316536633030643332306335383933653338383366643566 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.091000 audit: BPF prog-id=78 op=LOAD Feb 8 23:21:27.091000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300398 items=0 ppid=2216 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323330316536633030643332306335383933653338383366643566 Feb 8 23:21:27.092000 audit: BPF prog-id=78 op=UNLOAD Feb 8 23:21:27.092000 audit: BPF prog-id=77 op=UNLOAD Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { perfmon } for pid=2228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit[2228]: AVC avc: denied { bpf } for pid=2228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.092000 audit: BPF prog-id=79 op=LOAD Feb 8 23:21:27.092000 audit[2228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003007a8 items=0 ppid=2216 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323330316536633030643332306335383933653338383366643566 Feb 8 23:21:27.129906 env[1351]: time="2024-02-08T23:21:27.129855025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-a74a3a29e1,Uid:233be0881e49b813e7087c6ba89bd123,Namespace:kube-system,Attempt:0,} returns sandbox id \"1161fca7e8a8267b4d55ad862c0908af03bafc20d486dfb8c587c6cd2d58ac92\"" Feb 8 23:21:27.136002 env[1351]: time="2024-02-08T23:21:27.135957859Z" level=info msg="CreateContainer within sandbox \"1161fca7e8a8267b4d55ad862c0908af03bafc20d486dfb8c587c6cd2d58ac92\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 8 23:21:27.140712 env[1351]: time="2024-02-08T23:21:27.140674163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-a74a3a29e1,Uid:d399d9cbb3bb538b0a6ee6903f512c3f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a1d39d224a8158933a60d7a6683ceeac39c48593d90c68da9b0312c943649d38\"" Feb 8 23:21:27.143200 env[1351]: time="2024-02-08T23:21:27.143171918Z" level=info msg="CreateContainer within sandbox \"a1d39d224a8158933a60d7a6683ceeac39c48593d90c68da9b0312c943649d38\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 8 23:21:27.153623 env[1351]: time="2024-02-08T23:21:27.153591548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-a74a3a29e1,Uid:52e13694d34913c0b2896598512bd05c,Namespace:kube-system,Attempt:0,} returns sandbox id \"d42301e6c00d320c5893e3883fd5f76150b3fc99a8419a79b072f9792980bfe2\"" Feb 8 23:21:27.161313 kubelet[2120]: E0208 23:21:27.161289 2120 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a74a3a29e1?timeout=10s\": dial tcp 10.200.8.38:6443: connect: connection refused" interval="1.6s" Feb 8 23:21:27.176251 env[1351]: time="2024-02-08T23:21:27.176220746Z" level=info msg="CreateContainer within sandbox \"d42301e6c00d320c5893e3883fd5f76150b3fc99a8419a79b072f9792980bfe2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 8 23:21:27.222722 env[1351]: time="2024-02-08T23:21:27.222662669Z" level=info msg="CreateContainer within sandbox \"1161fca7e8a8267b4d55ad862c0908af03bafc20d486dfb8c587c6cd2d58ac92\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3b87d5a0defbc35914cb18f6e61109076aaf6034f4e98f127492ea09e786da1d\"" Feb 8 23:21:27.227199 env[1351]: time="2024-02-08T23:21:27.227156168Z" level=info msg="CreateContainer within sandbox \"a1d39d224a8158933a60d7a6683ceeac39c48593d90c68da9b0312c943649d38\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"313f4a1ed40b1916c6b0c607ac2bbfaf355573cb82dff11867036cbd4d0c3827\"" Feb 8 23:21:27.227627 env[1351]: time="2024-02-08T23:21:27.227451274Z" level=info msg="StartContainer for \"3b87d5a0defbc35914cb18f6e61109076aaf6034f4e98f127492ea09e786da1d\"" Feb 8 23:21:27.232864 env[1351]: time="2024-02-08T23:21:27.232835693Z" level=info msg="StartContainer for \"313f4a1ed40b1916c6b0c607ac2bbfaf355573cb82dff11867036cbd4d0c3827\"" Feb 8 23:21:27.235178 env[1351]: time="2024-02-08T23:21:27.235145144Z" level=info msg="CreateContainer within sandbox \"d42301e6c00d320c5893e3883fd5f76150b3fc99a8419a79b072f9792980bfe2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9cfaf31fe322abd0bec6845f99f0bd063b6d2e86b591d5293d777d09c05a9be9\"" Feb 8 23:21:27.241085 env[1351]: time="2024-02-08T23:21:27.241055474Z" level=info msg="StartContainer for \"9cfaf31fe322abd0bec6845f99f0bd063b6d2e86b591d5293d777d09c05a9be9\"" Feb 8 23:21:27.251546 systemd[1]: Started cri-containerd-3b87d5a0defbc35914cb18f6e61109076aaf6034f4e98f127492ea09e786da1d.scope. Feb 8 23:21:27.269560 kubelet[2120]: I0208 23:21:27.269512 2120 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:27.269935 kubelet[2120]: E0208 23:21:27.269915 2120 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.38:6443/api/v1/nodes\": dial tcp 10.200.8.38:6443: connect: connection refused" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:27.273538 systemd[1]: Started cri-containerd-313f4a1ed40b1916c6b0c607ac2bbfaf355573cb82dff11867036cbd4d0c3827.scope. Feb 8 23:21:27.286836 systemd[1]: Started cri-containerd-9cfaf31fe322abd0bec6845f99f0bd063b6d2e86b591d5293d777d09c05a9be9.scope. Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.291000 audit: BPF prog-id=80 op=LOAD Feb 8 23:21:27.291000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.291000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000151c48 a2=10 a3=1c items=0 ppid=2158 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383764356130646566626333353931346362313866366536313130 Feb 8 23:21:27.292000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.292000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001516b0 a2=3c a3=8 items=0 ppid=2158 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383764356130646566626333353931346362313866366536313130 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit: BPF prog-id=81 op=LOAD Feb 8 23:21:27.295000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001519d8 a2=78 a3=c000285660 items=0 ppid=2158 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383764356130646566626333353931346362313866366536313130 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.295000 audit: BPF prog-id=82 op=LOAD Feb 8 23:21:27.295000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000151770 a2=78 a3=c0002856a8 items=0 ppid=2158 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383764356130646566626333353931346362313866366536313130 Feb 8 23:21:27.296000 audit: BPF prog-id=82 op=UNLOAD Feb 8 23:21:27.296000 audit: BPF prog-id=81 op=UNLOAD Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.296000 audit: BPF prog-id=83 op=LOAD Feb 8 23:21:27.296000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000151c30 a2=78 a3=c000285ab8 items=0 ppid=2158 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383764356130646566626333353931346362313866366536313130 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.308000 audit: BPF prog-id=84 op=LOAD Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331336634613165643430623139313663366230633630376163326262 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331336634613165643430623139313663366230633630376163326262 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.309000 audit: BPF prog-id=85 op=LOAD Feb 8 23:21:27.309000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a4640 items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331336634613165643430623139313663366230633630376163326262 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.310000 audit: BPF prog-id=86 op=LOAD Feb 8 23:21:27.310000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a4688 items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331336634613165643430623139313663366230633630376163326262 Feb 8 23:21:27.311000 audit: BPF prog-id=86 op=UNLOAD Feb 8 23:21:27.311000 audit: BPF prog-id=85 op=UNLOAD Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.311000 audit: BPF prog-id=87 op=LOAD Feb 8 23:21:27.311000 audit[2303]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a4a98 items=0 ppid=2181 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331336634613165643430623139313663366230633630376163326262 Feb 8 23:21:27.331196 kubelet[2120]: W0208 23:21:27.331095 2120 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.331196 kubelet[2120]: E0208 23:21:27.331166 2120 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.38:6443: connect: connection refused Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit: BPF prog-id=88 op=LOAD Feb 8 23:21:27.332000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2216 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666166333166653332326162643062656336383435663939663062 Feb 8 23:21:27.332000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.332000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2216 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666166333166653332326162643062656336383435663939663062 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit: BPF prog-id=89 op=LOAD Feb 8 23:21:27.333000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ea080 items=0 ppid=2216 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666166333166653332326162643062656336383435663939663062 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit: BPF prog-id=90 op=LOAD Feb 8 23:21:27.333000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ea0c8 items=0 ppid=2216 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666166333166653332326162643062656336383435663939663062 Feb 8 23:21:27.333000 audit: BPF prog-id=90 op=UNLOAD Feb 8 23:21:27.333000 audit: BPF prog-id=89 op=UNLOAD Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:27.333000 audit: BPF prog-id=91 op=LOAD Feb 8 23:21:27.333000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ea4d8 items=0 ppid=2216 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:27.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666166333166653332326162643062656336383435663939663062 Feb 8 23:21:27.372308 env[1351]: time="2024-02-08T23:21:27.372251863Z" level=info msg="StartContainer for \"3b87d5a0defbc35914cb18f6e61109076aaf6034f4e98f127492ea09e786da1d\" returns successfully" Feb 8 23:21:27.386791 env[1351]: time="2024-02-08T23:21:27.386731282Z" level=info msg="StartContainer for \"313f4a1ed40b1916c6b0c607ac2bbfaf355573cb82dff11867036cbd4d0c3827\" returns successfully" Feb 8 23:21:27.427685 env[1351]: time="2024-02-08T23:21:27.427628483Z" level=info msg="StartContainer for \"9cfaf31fe322abd0bec6845f99f0bd063b6d2e86b591d5293d777d09c05a9be9\" returns successfully" Feb 8 23:21:28.698000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:28.698000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004fe9f0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:28.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:28.698000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:28.698000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000f2180 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:28.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:28.872717 kubelet[2120]: I0208 23:21:28.872679 2120 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:29.630349 kernel: kauditd_printk_skb: 567 callbacks suppressed Feb 8 23:21:29.630549 kernel: audit: type=1400 audit(1707434489.606:703): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.606000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.606000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.649623 kernel: audit: type=1400 audit(1707434489.606:704): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.606000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039804b0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.684095 kernel: audit: type=1300 audit(1707434489.606:704): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039804b0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.606000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.707549 kernel: audit: type=1327 audit(1707434489.606:704): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.606000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0038fcbd0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.750056 kernel: audit: type=1300 audit(1707434489.606:703): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0038fcbd0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.750151 kernel: audit: type=1327 audit(1707434489.606:703): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.606000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.768286 kernel: audit: type=1400 audit(1707434489.648:705): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.648000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.648000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c006e2b0e0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.791457 kernel: audit: type=1300 audit(1707434489.648:705): arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c006e2b0e0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.648000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.815643 kernel: audit: type=1327 audit(1707434489.648:705): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.655000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.839453 kernel: audit: type=1400 audit(1707434489.655:706): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.655000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0038fd680 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.655000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.726000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.726000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c00a21c360 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.726000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.749000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:29.749000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c004e799e0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:21:29.749000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:21:29.888222 kubelet[2120]: I0208 23:21:29.888124 2120 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:29.909682 kubelet[2120]: E0208 23:21:29.909646 2120 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-a74a3a29e1\" not found" Feb 8 23:21:30.549180 kubelet[2120]: E0208 23:21:30.549143 2120 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:30.587549 kubelet[2120]: E0208 23:21:30.587512 2120 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:30.753536 kubelet[2120]: I0208 23:21:30.753496 2120 apiserver.go:52] "Watching apiserver" Feb 8 23:21:30.761530 kubelet[2120]: I0208 23:21:30.761502 2120 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 8 23:21:32.420617 systemd[1]: Reloading. Feb 8 23:21:32.490178 /usr/lib/systemd/system-generators/torcx-generator[2407]: time="2024-02-08T23:21:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:21:32.493520 /usr/lib/systemd/system-generators/torcx-generator[2407]: time="2024-02-08T23:21:32Z" level=info msg="torcx already run" Feb 8 23:21:32.594478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:21:32.594498 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:21:32.612853 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.690000 audit: BPF prog-id=92 op=LOAD Feb 8 23:21:32.691000 audit: BPF prog-id=76 op=UNLOAD Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.693000 audit: BPF prog-id=93 op=LOAD Feb 8 23:21:32.693000 audit: BPF prog-id=53 op=UNLOAD Feb 8 23:21:32.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.694000 audit: BPF prog-id=94 op=LOAD Feb 8 23:21:32.694000 audit: BPF prog-id=54 op=UNLOAD Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.695000 audit: BPF prog-id=95 op=LOAD Feb 8 23:21:32.695000 audit: BPF prog-id=72 op=UNLOAD Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.697000 audit: BPF prog-id=96 op=LOAD Feb 8 23:21:32.697000 audit: BPF prog-id=88 op=UNLOAD Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit: BPF prog-id=97 op=LOAD Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.698000 audit: BPF prog-id=98 op=LOAD Feb 8 23:21:32.698000 audit: BPF prog-id=55 op=UNLOAD Feb 8 23:21:32.698000 audit: BPF prog-id=56 op=UNLOAD Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit: BPF prog-id=99 op=LOAD Feb 8 23:21:32.700000 audit: BPF prog-id=57 op=UNLOAD Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit: BPF prog-id=100 op=LOAD Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.700000 audit: BPF prog-id=101 op=LOAD Feb 8 23:21:32.700000 audit: BPF prog-id=58 op=UNLOAD Feb 8 23:21:32.700000 audit: BPF prog-id=59 op=UNLOAD Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.702000 audit: BPF prog-id=102 op=LOAD Feb 8 23:21:32.702000 audit: BPF prog-id=60 op=UNLOAD Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit: BPF prog-id=103 op=LOAD Feb 8 23:21:32.704000 audit: BPF prog-id=61 op=UNLOAD Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit: BPF prog-id=104 op=LOAD Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.704000 audit: BPF prog-id=105 op=LOAD Feb 8 23:21:32.704000 audit: BPF prog-id=62 op=UNLOAD Feb 8 23:21:32.704000 audit: BPF prog-id=63 op=UNLOAD Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.706000 audit: BPF prog-id=106 op=LOAD Feb 8 23:21:32.706000 audit: BPF prog-id=64 op=UNLOAD Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.707000 audit: BPF prog-id=107 op=LOAD Feb 8 23:21:32.707000 audit: BPF prog-id=84 op=UNLOAD Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.708000 audit: BPF prog-id=108 op=LOAD Feb 8 23:21:32.708000 audit: BPF prog-id=80 op=UNLOAD Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.709000 audit: BPF prog-id=109 op=LOAD Feb 8 23:21:32.709000 audit: BPF prog-id=68 op=UNLOAD Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit: BPF prog-id=110 op=LOAD Feb 8 23:21:32.710000 audit: BPF prog-id=65 op=UNLOAD Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit: BPF prog-id=111 op=LOAD Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.710000 audit: BPF prog-id=112 op=LOAD Feb 8 23:21:32.710000 audit: BPF prog-id=66 op=UNLOAD Feb 8 23:21:32.710000 audit: BPF prog-id=67 op=UNLOAD Feb 8 23:21:32.727602 kubelet[2120]: I0208 23:21:32.727451 2120 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:21:32.728704 systemd[1]: Stopping kubelet.service... Feb 8 23:21:32.747677 systemd[1]: kubelet.service: Deactivated successfully. Feb 8 23:21:32.747888 systemd[1]: Stopped kubelet.service. Feb 8 23:21:32.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:32.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:32.749996 systemd[1]: Started kubelet.service. Feb 8 23:21:32.831745 kubelet[2469]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:21:32.831745 kubelet[2469]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 8 23:21:32.831745 kubelet[2469]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:21:32.832243 kubelet[2469]: I0208 23:21:32.831790 2469 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 8 23:21:32.836346 kubelet[2469]: I0208 23:21:32.836324 2469 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 8 23:21:32.836482 kubelet[2469]: I0208 23:21:32.836467 2469 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 8 23:21:32.836697 kubelet[2469]: I0208 23:21:32.836680 2469 server.go:895] "Client rotation is on, will bootstrap in background" Feb 8 23:21:32.838202 kubelet[2469]: I0208 23:21:32.838181 2469 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 8 23:21:32.839212 kubelet[2469]: I0208 23:21:32.839186 2469 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:21:32.844777 kubelet[2469]: I0208 23:21:32.844750 2469 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 8 23:21:32.844987 kubelet[2469]: I0208 23:21:32.844967 2469 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 8 23:21:32.845151 kubelet[2469]: I0208 23:21:32.845130 2469 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845163 2469 topology_manager.go:138] "Creating topology manager with none policy" Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845176 2469 container_manager_linux.go:301] "Creating device plugin manager" Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845215 2469 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845305 2469 kubelet.go:393] "Attempting to sync node with API server" Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845320 2469 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 8 23:21:32.845357 kubelet[2469]: I0208 23:21:32.845354 2469 kubelet.go:309] "Adding apiserver pod source" Feb 8 23:21:32.845614 kubelet[2469]: I0208 23:21:32.845375 2469 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 8 23:21:32.853464 kubelet[2469]: I0208 23:21:32.849118 2469 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 8 23:21:32.853464 kubelet[2469]: I0208 23:21:32.850169 2469 server.go:1232] "Started kubelet" Feb 8 23:21:32.852000 audit[2469]: AVC avc: denied { mac_admin } for pid=2469 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:32.852000 audit[2469]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00052d440 a1=c000d024c8 a2=c00052d410 a3=25 items=0 ppid=1 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:32.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:32.852000 audit[2469]: AVC avc: denied { mac_admin } for pid=2469 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:32.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:32.852000 audit[2469]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000477e00 a1=c000d024e0 a2=c00052d4d0 a3=25 items=0 ppid=1 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:32.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:32.854256 kubelet[2469]: I0208 23:21:32.853787 2469 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 8 23:21:32.854256 kubelet[2469]: I0208 23:21:32.853838 2469 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 8 23:21:32.854256 kubelet[2469]: I0208 23:21:32.853864 2469 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 8 23:21:32.856567 kubelet[2469]: E0208 23:21:32.856532 2469 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 8 23:21:32.856567 kubelet[2469]: E0208 23:21:32.856567 2469 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 8 23:21:32.874501 kubelet[2469]: I0208 23:21:32.874479 2469 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 8 23:21:32.875313 kubelet[2469]: I0208 23:21:32.875288 2469 server.go:462] "Adding debug handlers to kubelet server" Feb 8 23:21:32.889577 kubelet[2469]: I0208 23:21:32.885728 2469 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 8 23:21:32.889577 kubelet[2469]: I0208 23:21:32.885928 2469 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 8 23:21:32.901276 kubelet[2469]: I0208 23:21:32.901255 2469 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 8 23:21:32.901919 kubelet[2469]: I0208 23:21:32.901900 2469 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 8 23:21:32.902198 kubelet[2469]: I0208 23:21:32.902184 2469 reconciler_new.go:29] "Reconciler: start to sync state" Feb 8 23:21:32.928601 kubelet[2469]: I0208 23:21:32.927112 2469 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 8 23:21:32.943525 kubelet[2469]: I0208 23:21:32.943411 2469 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 8 23:21:32.943525 kubelet[2469]: I0208 23:21:32.943499 2469 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 8 23:21:32.948640 kubelet[2469]: I0208 23:21:32.948617 2469 kubelet.go:2303] "Starting kubelet main sync loop" Feb 8 23:21:32.948754 kubelet[2469]: E0208 23:21:32.948694 2469 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 8 23:21:33.033672 kubelet[2469]: I0208 23:21:33.033644 2469 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.048963 kubelet[2469]: E0208 23:21:33.048930 2469 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 8 23:21:33.050181 kubelet[2469]: I0208 23:21:33.050156 2469 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 8 23:21:33.050181 kubelet[2469]: I0208 23:21:33.050179 2469 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 8 23:21:33.050330 kubelet[2469]: I0208 23:21:33.050198 2469 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:21:33.050389 kubelet[2469]: I0208 23:21:33.050374 2469 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 8 23:21:33.050449 kubelet[2469]: I0208 23:21:33.050408 2469 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 8 23:21:33.050449 kubelet[2469]: I0208 23:21:33.050419 2469 policy_none.go:49] "None policy: Start" Feb 8 23:21:33.051414 kubelet[2469]: I0208 23:21:33.051388 2469 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 8 23:21:33.051414 kubelet[2469]: I0208 23:21:33.051418 2469 state_mem.go:35] "Initializing new in-memory state store" Feb 8 23:21:33.051675 kubelet[2469]: I0208 23:21:33.051655 2469 state_mem.go:75] "Updated machine memory state" Feb 8 23:21:33.056141 kubelet[2469]: I0208 23:21:33.056114 2469 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 8 23:21:33.056230 kubelet[2469]: I0208 23:21:33.056187 2469 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 8 23:21:33.054000 audit[2469]: AVC avc: denied { mac_admin } for pid=2469 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:33.054000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:21:33.054000 audit[2469]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011da5a0 a1=c0011ddd10 a2=c0011da570 a3=25 items=0 ppid=1 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:33.054000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:21:33.056602 kubelet[2469]: I0208 23:21:33.056408 2469 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 8 23:21:33.064068 kubelet[2469]: I0208 23:21:33.064046 2469 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.064230 kubelet[2469]: I0208 23:21:33.064219 2469 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.249676 kubelet[2469]: I0208 23:21:33.249541 2469 topology_manager.go:215] "Topology Admit Handler" podUID="d399d9cbb3bb538b0a6ee6903f512c3f" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.249865 kubelet[2469]: I0208 23:21:33.249706 2469 topology_manager.go:215] "Topology Admit Handler" podUID="233be0881e49b813e7087c6ba89bd123" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.249865 kubelet[2469]: I0208 23:21:33.249757 2469 topology_manager.go:215] "Topology Admit Handler" podUID="52e13694d34913c0b2896598512bd05c" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.261053 kubelet[2469]: W0208 23:21:33.261020 2469 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 8 23:21:33.264487 kubelet[2469]: W0208 23:21:33.264463 2469 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 8 23:21:33.265222 kubelet[2469]: W0208 23:21:33.265198 2469 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 8 23:21:33.304642 kubelet[2469]: I0208 23:21:33.304612 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/52e13694d34913c0b2896598512bd05c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-a74a3a29e1\" (UID: \"52e13694d34913c0b2896598512bd05c\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304769 kubelet[2469]: I0208 23:21:33.304659 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304769 kubelet[2469]: I0208 23:21:33.304689 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304769 kubelet[2469]: I0208 23:21:33.304717 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304906 kubelet[2469]: I0208 23:21:33.304748 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304906 kubelet[2469]: I0208 23:21:33.304806 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304906 kubelet[2469]: I0208 23:21:33.304836 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304906 kubelet[2469]: I0208 23:21:33.304866 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d399d9cbb3bb538b0a6ee6903f512c3f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" (UID: \"d399d9cbb3bb538b0a6ee6903f512c3f\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.304906 kubelet[2469]: I0208 23:21:33.304897 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/233be0881e49b813e7087c6ba89bd123-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-a74a3a29e1\" (UID: \"233be0881e49b813e7087c6ba89bd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:33.856739 kubelet[2469]: I0208 23:21:33.856642 2469 apiserver.go:52] "Watching apiserver" Feb 8 23:21:33.903195 kubelet[2469]: I0208 23:21:33.903145 2469 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 8 23:21:33.999609 kubelet[2469]: W0208 23:21:33.999573 2469 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 8 23:21:34.000034 kubelet[2469]: E0208 23:21:34.000010 2469 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-a74a3a29e1\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" Feb 8 23:21:34.075018 kubelet[2469]: I0208 23:21:34.074981 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-a74a3a29e1" podStartSLOduration=1.074896216 podCreationTimestamp="2024-02-08 23:21:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:21:34.041055695 +0000 UTC m=+1.283585466" watchObservedRunningTime="2024-02-08 23:21:34.074896216 +0000 UTC m=+1.317425987" Feb 8 23:21:34.102815 kubelet[2469]: I0208 23:21:34.102771 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-a74a3a29e1" podStartSLOduration=1.102705427 podCreationTimestamp="2024-02-08 23:21:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:21:34.075663031 +0000 UTC m=+1.318192902" watchObservedRunningTime="2024-02-08 23:21:34.102705427 +0000 UTC m=+1.345235198" Feb 8 23:21:34.124286 kubelet[2469]: I0208 23:21:34.123883 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a74a3a29e1" podStartSLOduration=1.123843515 podCreationTimestamp="2024-02-08 23:21:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:21:34.103479841 +0000 UTC m=+1.346009712" watchObservedRunningTime="2024-02-08 23:21:34.123843515 +0000 UTC m=+1.366373286" Feb 8 23:21:40.198477 sudo[1709]: pam_unix(sudo:session): session closed for user root Feb 8 23:21:40.198000 audit[1709]: USER_END pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:40.202332 kernel: kauditd_printk_skb: 266 callbacks suppressed Feb 8 23:21:40.202436 kernel: audit: type=1106 audit(1707434500.198:958): pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:40.202000 audit[1709]: CRED_DISP pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:40.234615 kernel: audit: type=1104 audit(1707434500.202:959): pid=1709 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:21:40.306510 sshd[1706]: pam_unix(sshd:session): session closed for user core Feb 8 23:21:40.308000 audit[1706]: USER_END pid=1706 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:40.310532 systemd-logind[1333]: Session 9 logged out. Waiting for processes to exit. Feb 8 23:21:40.312110 systemd[1]: sshd@6-10.200.8.38:22-10.200.12.6:57272.service: Deactivated successfully. Feb 8 23:21:40.313004 systemd[1]: session-9.scope: Deactivated successfully. Feb 8 23:21:40.313171 systemd[1]: session-9.scope: Consumed 3.652s CPU time. Feb 8 23:21:40.314763 systemd-logind[1333]: Removed session 9. Feb 8 23:21:40.308000 audit[1706]: CRED_DISP pid=1706 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:40.343155 kernel: audit: type=1106 audit(1707434500.308:960): pid=1706 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:40.343228 kernel: audit: type=1104 audit(1707434500.308:961): pid=1706 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:21:40.343252 kernel: audit: type=1131 audit(1707434500.308:962): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.12.6:57272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:40.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.38:22-10.200.12.6:57272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:21:43.820000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 8 23:21:43.820000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001b6c00 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:43.861386 kernel: audit: type=1400 audit(1707434503.820:963): avc: denied { watch } for pid=2317 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 8 23:21:43.861497 kernel: audit: type=1300 audit(1707434503.820:963): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001b6c00 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:43.861525 kernel: audit: type=1327 audit(1707434503.820:963): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:43.820000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.316000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.316000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc1e80 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.356093 kernel: audit: type=1400 audit(1707434505.316:964): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.356187 kernel: audit: type=1300 audit(1707434505.316:964): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc1e80 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.356218 kernel: audit: type=1327 audit(1707434505.316:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.322000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.389574 kernel: audit: type=1400 audit(1707434505.322:965): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.322000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc1fe0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.413408 kernel: audit: type=1300 audit(1707434505.322:965): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc1fe0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.413497 kernel: audit: type=1327 audit(1707434505.322:965): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.322000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.447034 kernel: audit: type=1400 audit(1707434505.322:966): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.447114 kernel: audit: type=1300 audit(1707434505.322:966): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001388120 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.322000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001388120 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.322000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.499687 kernel: audit: type=1327 audit(1707434505.322:966): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.499769 kernel: audit: type=1400 audit(1707434505.322:967): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:21:45.322000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001405300 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:21:45.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:21:45.790419 kubelet[2469]: I0208 23:21:45.790387 2469 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 8 23:21:45.790983 env[1351]: time="2024-02-08T23:21:45.790942139Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 8 23:21:45.791517 kubelet[2469]: I0208 23:21:45.791494 2469 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 8 23:21:46.680511 kubelet[2469]: I0208 23:21:46.680472 2469 topology_manager.go:215] "Topology Admit Handler" podUID="53243499-e34b-421f-8a0e-aac7506e4522" podNamespace="kube-system" podName="kube-proxy-6zm5q" Feb 8 23:21:46.687006 systemd[1]: Created slice kubepods-besteffort-pod53243499_e34b_421f_8a0e_aac7506e4522.slice. Feb 8 23:21:46.690791 kubelet[2469]: I0208 23:21:46.690767 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/53243499-e34b-421f-8a0e-aac7506e4522-xtables-lock\") pod \"kube-proxy-6zm5q\" (UID: \"53243499-e34b-421f-8a0e-aac7506e4522\") " pod="kube-system/kube-proxy-6zm5q" Feb 8 23:21:46.691291 kubelet[2469]: I0208 23:21:46.691268 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/53243499-e34b-421f-8a0e-aac7506e4522-lib-modules\") pod \"kube-proxy-6zm5q\" (UID: \"53243499-e34b-421f-8a0e-aac7506e4522\") " pod="kube-system/kube-proxy-6zm5q" Feb 8 23:21:46.691484 kubelet[2469]: I0208 23:21:46.691471 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7dghp\" (UniqueName: \"kubernetes.io/projected/53243499-e34b-421f-8a0e-aac7506e4522-kube-api-access-7dghp\") pod \"kube-proxy-6zm5q\" (UID: \"53243499-e34b-421f-8a0e-aac7506e4522\") " pod="kube-system/kube-proxy-6zm5q" Feb 8 23:21:46.691617 kubelet[2469]: I0208 23:21:46.691602 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/53243499-e34b-421f-8a0e-aac7506e4522-kube-proxy\") pod \"kube-proxy-6zm5q\" (UID: \"53243499-e34b-421f-8a0e-aac7506e4522\") " pod="kube-system/kube-proxy-6zm5q" Feb 8 23:21:46.803498 kubelet[2469]: I0208 23:21:46.803454 2469 topology_manager.go:215] "Topology Admit Handler" podUID="f617c54c-be98-4897-b03b-480a3af7b250" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-ppqrd" Feb 8 23:21:46.809369 systemd[1]: Created slice kubepods-besteffort-podf617c54c_be98_4897_b03b_480a3af7b250.slice. Feb 8 23:21:46.993226 kubelet[2469]: I0208 23:21:46.992996 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dp6zk\" (UniqueName: \"kubernetes.io/projected/f617c54c-be98-4897-b03b-480a3af7b250-kube-api-access-dp6zk\") pod \"tigera-operator-55585899bf-ppqrd\" (UID: \"f617c54c-be98-4897-b03b-480a3af7b250\") " pod="tigera-operator/tigera-operator-55585899bf-ppqrd" Feb 8 23:21:46.993226 kubelet[2469]: I0208 23:21:46.993143 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f617c54c-be98-4897-b03b-480a3af7b250-var-lib-calico\") pod \"tigera-operator-55585899bf-ppqrd\" (UID: \"f617c54c-be98-4897-b03b-480a3af7b250\") " pod="tigera-operator/tigera-operator-55585899bf-ppqrd" Feb 8 23:21:46.998014 env[1351]: time="2024-02-08T23:21:46.997963413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6zm5q,Uid:53243499-e34b-421f-8a0e-aac7506e4522,Namespace:kube-system,Attempt:0,}" Feb 8 23:21:47.038243 env[1351]: time="2024-02-08T23:21:47.038168951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:21:47.038243 env[1351]: time="2024-02-08T23:21:47.038206151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:21:47.038547 env[1351]: time="2024-02-08T23:21:47.038220452Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:21:47.038547 env[1351]: time="2024-02-08T23:21:47.038355253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766 pid=2553 runtime=io.containerd.runc.v2 Feb 8 23:21:47.058509 systemd[1]: run-containerd-runc-k8s.io-f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766-runc.R2wLXm.mount: Deactivated successfully. Feb 8 23:21:47.061570 systemd[1]: Started cri-containerd-f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766.scope. Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.070000 audit: BPF prog-id=113 op=LOAD Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333736393631353632383035396264363361313035303531373633 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333736393631353632383035396264363361313035303531373633 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit: BPF prog-id=114 op=LOAD Feb 8 23:21:47.071000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002924d0 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333736393631353632383035396264363361313035303531373633 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit: BPF prog-id=115 op=LOAD Feb 8 23:21:47.071000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000292518 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333736393631353632383035396264363361313035303531373633 Feb 8 23:21:47.071000 audit: BPF prog-id=115 op=UNLOAD Feb 8 23:21:47.071000 audit: BPF prog-id=114 op=UNLOAD Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.071000 audit: BPF prog-id=116 op=LOAD Feb 8 23:21:47.071000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000292928 items=0 ppid=2553 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333736393631353632383035396264363361313035303531373633 Feb 8 23:21:47.088598 env[1351]: time="2024-02-08T23:21:47.088536624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6zm5q,Uid:53243499-e34b-421f-8a0e-aac7506e4522,Namespace:kube-system,Attempt:0,} returns sandbox id \"f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766\"" Feb 8 23:21:47.092390 env[1351]: time="2024-02-08T23:21:47.091963670Z" level=info msg="CreateContainer within sandbox \"f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 8 23:21:47.113157 env[1351]: time="2024-02-08T23:21:47.113124752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-ppqrd,Uid:f617c54c-be98-4897-b03b-480a3af7b250,Namespace:tigera-operator,Attempt:0,}" Feb 8 23:21:47.139784 env[1351]: time="2024-02-08T23:21:47.139738008Z" level=info msg="CreateContainer within sandbox \"f73769615628059bd63a1050517635d7516d5d4dc33ac0d0b5d20f155e62a766\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1638fd442873eec8295c2c43d65cec5275ae2233eef1c810b1eb7bd01fb4a106\"" Feb 8 23:21:47.142843 env[1351]: time="2024-02-08T23:21:47.140569319Z" level=info msg="StartContainer for \"1638fd442873eec8295c2c43d65cec5275ae2233eef1c810b1eb7bd01fb4a106\"" Feb 8 23:21:47.170539 env[1351]: time="2024-02-08T23:21:47.167111773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:21:47.170539 env[1351]: time="2024-02-08T23:21:47.167195775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:21:47.170539 env[1351]: time="2024-02-08T23:21:47.167231775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:21:47.170539 env[1351]: time="2024-02-08T23:21:47.167386577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04af637a1f183c4d440f3abb6b8adc5706bbf26b01c554e74053d57d8755d297 pid=2609 runtime=io.containerd.runc.v2 Feb 8 23:21:47.168034 systemd[1]: Started cri-containerd-1638fd442873eec8295c2c43d65cec5275ae2233eef1c810b1eb7bd01fb4a106.scope. Feb 8 23:21:47.194555 systemd[1]: Started cri-containerd-04af637a1f183c4d440f3abb6b8adc5706bbf26b01c554e74053d57d8755d297.scope. Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=2553 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333866643434323837336565633832393563326334336436356365 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.203000 audit: BPF prog-id=117 op=LOAD Feb 8 23:21:47.203000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00013d9d8 a2=78 a3=c0001ae980 items=0 ppid=2553 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333866643434323837336565633832393563326334336436356365 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit: BPF prog-id=118 op=LOAD Feb 8 23:21:47.204000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00013d770 a2=78 a3=c0001ae9c8 items=0 ppid=2553 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333866643434323837336565633832393563326334336436356365 Feb 8 23:21:47.204000 audit: BPF prog-id=118 op=UNLOAD Feb 8 23:21:47.204000 audit: BPF prog-id=117 op=UNLOAD Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { perfmon } for pid=2594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit[2594]: AVC avc: denied { bpf } for pid=2594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.204000 audit: BPF prog-id=119 op=LOAD Feb 8 23:21:47.204000 audit[2594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00013dc30 a2=78 a3=c0001aea58 items=0 ppid=2553 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333866643434323837336565633832393563326334336436356365 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit: BPF prog-id=120 op=LOAD Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2609 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616636333761316631383363346434343066336162623662386164 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2609 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616636333761316631383363346434343066336162623662386164 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.218000 audit: BPF prog-id=121 op=LOAD Feb 8 23:21:47.218000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000388340 items=0 ppid=2609 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616636333761316631383363346434343066336162623662386164 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit: BPF prog-id=122 op=LOAD Feb 8 23:21:47.219000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000388388 items=0 ppid=2609 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616636333761316631383363346434343066336162623662386164 Feb 8 23:21:47.219000 audit: BPF prog-id=122 op=UNLOAD Feb 8 23:21:47.219000 audit: BPF prog-id=121 op=UNLOAD Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { perfmon } for pid=2622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit[2622]: AVC avc: denied { bpf } for pid=2622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:21:47.219000 audit: BPF prog-id=123 op=LOAD Feb 8 23:21:47.219000 audit[2622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000388798 items=0 ppid=2609 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616636333761316631383363346434343066336162623662386164 Feb 8 23:21:47.231491 env[1351]: time="2024-02-08T23:21:47.231444633Z" level=info msg="StartContainer for \"1638fd442873eec8295c2c43d65cec5275ae2233eef1c810b1eb7bd01fb4a106\" returns successfully" Feb 8 23:21:47.265746 env[1351]: time="2024-02-08T23:21:47.265624490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-ppqrd,Uid:f617c54c-be98-4897-b03b-480a3af7b250,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"04af637a1f183c4d440f3abb6b8adc5706bbf26b01c554e74053d57d8755d297\"" Feb 8 23:21:47.270731 env[1351]: time="2024-02-08T23:21:47.270694157Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 8 23:21:47.307000 audit[2686]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.307000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffef2dbd00 a2=0 a3=7fffef2dbcec items=0 ppid=2624 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:21:47.310000 audit[2688]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.310000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd32b22290 a2=0 a3=7ffd32b2227c items=0 ppid=2624 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:21:47.311000 audit[2689]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.311000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd50507250 a2=0 a3=7ffd5050723c items=0 ppid=2624 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:21:47.312000 audit[2687]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.312000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd12cf3290 a2=0 a3=7ffd12cf327c items=0 ppid=2624 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:21:47.313000 audit[2690]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.313000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0b3272d0 a2=0 a3=7ffe0b3272bc items=0 ppid=2624 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:21:47.314000 audit[2691]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.314000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbcf50af0 a2=0 a3=7ffcbcf50adc items=0 ppid=2624 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:21:47.409000 audit[2692]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.409000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd414817d0 a2=0 a3=7ffd414817bc items=0 ppid=2624 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:21:47.413000 audit[2694]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.413000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe550ed2b0 a2=0 a3=7ffe550ed29c items=0 ppid=2624 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 8 23:21:47.418000 audit[2697]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.418000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc1c2acda0 a2=0 a3=7ffc1c2acd8c items=0 ppid=2624 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 8 23:21:47.419000 audit[2698]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.419000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffead8fc6f0 a2=0 a3=7ffead8fc6dc items=0 ppid=2624 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:21:47.421000 audit[2700]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.421000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca2b77480 a2=0 a3=7ffca2b7746c items=0 ppid=2624 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:21:47.422000 audit[2701]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.422000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca158ed80 a2=0 a3=7ffca158ed6c items=0 ppid=2624 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:21:47.425000 audit[2703]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.425000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff045b4b90 a2=0 a3=7fff045b4b7c items=0 ppid=2624 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:21:47.428000 audit[2706]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.428000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe31f1ae20 a2=0 a3=7ffe31f1ae0c items=0 ppid=2624 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 8 23:21:47.429000 audit[2707]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.429000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb9c8e2d0 a2=0 a3=7ffeb9c8e2bc items=0 ppid=2624 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:21:47.432000 audit[2709]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.432000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea6d909c0 a2=0 a3=7ffea6d909ac items=0 ppid=2624 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:21:47.433000 audit[2710]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.433000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb8f6a180 a2=0 a3=7ffdb8f6a16c items=0 ppid=2624 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:21:47.436000 audit[2712]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.436000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde36ee520 a2=0 a3=7ffde36ee50c items=0 ppid=2624 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:21:47.439000 audit[2715]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.439000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4af4daa0 a2=0 a3=7ffc4af4da8c items=0 ppid=2624 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:21:47.443000 audit[2718]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.443000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9e0c4d60 a2=0 a3=7ffe9e0c4d4c items=0 ppid=2624 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:21:47.444000 audit[2719]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.444000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd72a64580 a2=0 a3=7ffd72a6456c items=0 ppid=2624 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:21:47.447000 audit[2721]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.447000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffde152f600 a2=0 a3=7ffde152f5ec items=0 ppid=2624 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:21:47.451000 audit[2724]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.451000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff81707fd0 a2=0 a3=7fff81707fbc items=0 ppid=2624 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:21:47.452000 audit[2725]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.452000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1ae9fc00 a2=0 a3=7fff1ae9fbec items=0 ppid=2624 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:21:47.454000 audit[2727]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:21:47.454000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe3ab36460 a2=0 a3=7ffe3ab3644c items=0 ppid=2624 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:21:47.501000 audit[2733]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:21:47.501000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd06547380 a2=0 a3=7ffd0654736c items=0 ppid=2624 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:21:47.543000 audit[2733]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:21:47.543000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd06547380 a2=0 a3=7ffd0654736c items=0 ppid=2624 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.543000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:21:47.544000 audit[2738]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.544000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6fdb3fb0 a2=0 a3=7fff6fdb3f9c items=0 ppid=2624 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:21:47.548000 audit[2740]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.548000 audit[2740]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff329e4970 a2=0 a3=7fff329e495c items=0 ppid=2624 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 8 23:21:47.554000 audit[2743]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.554000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed9518340 a2=0 a3=7ffed951832c items=0 ppid=2624 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 8 23:21:47.555000 audit[2744]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.555000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef8c60440 a2=0 a3=7ffef8c6042c items=0 ppid=2624 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:21:47.557000 audit[2746]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.557000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd723566f0 a2=0 a3=7ffd723566dc items=0 ppid=2624 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:21:47.558000 audit[2747]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.558000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb2b1bf20 a2=0 a3=7ffeb2b1bf0c items=0 ppid=2624 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:21:47.561000 audit[2749]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.561000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe5096650 a2=0 a3=7fffe509663c items=0 ppid=2624 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 8 23:21:47.564000 audit[2752]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.564000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc4a9797c0 a2=0 a3=7ffc4a9797ac items=0 ppid=2624 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:21:47.565000 audit[2753]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.565000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6f98f300 a2=0 a3=7ffe6f98f2ec items=0 ppid=2624 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:21:47.568000 audit[2755]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.568000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8f6e1f10 a2=0 a3=7ffe8f6e1efc items=0 ppid=2624 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:21:47.569000 audit[2756]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.569000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ead1120 a2=0 a3=7ffc8ead110c items=0 ppid=2624 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:21:47.571000 audit[2758]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.571000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd165c1b80 a2=0 a3=7ffd165c1b6c items=0 ppid=2624 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:21:47.575000 audit[2761]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.575000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbcda94a0 a2=0 a3=7ffcbcda948c items=0 ppid=2624 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:21:47.578000 audit[2764]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.578000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3a5c3750 a2=0 a3=7ffe3a5c373c items=0 ppid=2624 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 8 23:21:47.580000 audit[2765]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.580000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff731f2480 a2=0 a3=7fff731f246c items=0 ppid=2624 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:21:47.582000 audit[2767]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.582000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec12e66a0 a2=0 a3=7ffec12e668c items=0 ppid=2624 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:21:47.585000 audit[2770]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.585000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffbd571240 a2=0 a3=7fffbd57122c items=0 ppid=2624 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:21:47.586000 audit[2771]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.586000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefafff460 a2=0 a3=7ffefafff44c items=0 ppid=2624 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:21:47.588000 audit[2773]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.588000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff7eb9ae30 a2=0 a3=7fff7eb9ae1c items=0 ppid=2624 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:21:47.589000 audit[2774]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.589000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb538aa90 a2=0 a3=7ffeb538aa7c items=0 ppid=2624 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:21:47.592000 audit[2776]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.592000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe14fc4810 a2=0 a3=7ffe14fc47fc items=0 ppid=2624 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:21:47.595000 audit[2779]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:21:47.595000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc93b660d0 a2=0 a3=7ffc93b660bc items=0 ppid=2624 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:21:47.600000 audit[2781]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:21:47.600000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff91421c30 a2=0 a3=7fff91421c1c items=0 ppid=2624 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.600000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:21:47.601000 audit[2781]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:21:47.601000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff91421c30 a2=0 a3=7fff91421c1c items=0 ppid=2624 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:21:47.601000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:21:48.026624 kubelet[2469]: I0208 23:21:48.026425 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-6zm5q" podStartSLOduration=2.026358545 podCreationTimestamp="2024-02-08 23:21:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:21:48.026138142 +0000 UTC m=+15.268668013" watchObservedRunningTime="2024-02-08 23:21:48.026358545 +0000 UTC m=+15.268888416" Feb 8 23:21:48.257778 env[1351]: time="2024-02-08T23:21:48.257679665Z" level=error msg="PullImage \"quay.io/tigera/operator:v1.32.3\" failed" error="failed to pull and unpack image \"quay.io/tigera/operator:v1.32.3\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/quayio-production-s3/sha256/7b/7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20240208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240208T232148Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=0fbb36db5aeca1e6c97d8ebf37f99f01c5386d9d2992001341a7f86f67d464c7&cf_sign=MS67eQ5Xd5Wyno5paiDhvLrk2tq35Q9YkUw8pAQlwJGuCuCvUjvEjPnMWxQn%2FMZnj%2BVfuNCch2w%2BbDjoA6T%2B63f2tcnGv8nEGVmHulG91oIq5s%2BELFbVVfxQzwUciZlFIgfNfCu9l5xUiY%2FTDgw5Lph5iaa2qYYDkI4BzXm5eP3Fal0P5iHTFnkP4Y%2BysrPeci84cSX1AfhDLOM7YkaqGJVFX8%2BcWelb6SFn53eFrAF5xbLilXecY9hxOsPsr7zv14sspe7TqLt3iaiKQpyCiGJkS7zAB60pYsR32A7mG189Rswjvg6ygYat6gD%2BaWfD4FrQlKnu6Sh6%2Fy5RqFkq0g%3D%3D&cf_expiry=1707435108®ion=us-east-1&namespace=tigera\": dial tcp: lookup cdn03.quay.io: no such host" Feb 8 23:21:48.258275 kubelet[2469]: E0208 23:21:48.258219 2469 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/tigera/operator:v1.32.3\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/quayio-production-s3/sha256/7b/7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20240208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240208T232148Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=0fbb36db5aeca1e6c97d8ebf37f99f01c5386d9d2992001341a7f86f67d464c7&cf_sign=MS67eQ5Xd5Wyno5paiDhvLrk2tq35Q9YkUw8pAQlwJGuCuCvUjvEjPnMWxQn%2FMZnj%2BVfuNCch2w%2BbDjoA6T%2B63f2tcnGv8nEGVmHulG91oIq5s%2BELFbVVfxQzwUciZlFIgfNfCu9l5xUiY%2FTDgw5Lph5iaa2qYYDkI4BzXm5eP3Fal0P5iHTFnkP4Y%2BysrPeci84cSX1AfhDLOM7YkaqGJVFX8%2BcWelb6SFn53eFrAF5xbLilXecY9hxOsPsr7zv14sspe7TqLt3iaiKQpyCiGJkS7zAB60pYsR32A7mG189Rswjvg6ygYat6gD%2BaWfD4FrQlKnu6Sh6%2Fy5RqFkq0g%3D%3D&cf_expiry=1707435108®ion=us-east-1&namespace=tigera\": dial tcp: lookup cdn03.quay.io: no such host" image="quay.io/tigera/operator:v1.32.3" Feb 8 23:21:48.258415 kubelet[2469]: E0208 23:21:48.258296 2469 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"quay.io/tigera/operator:v1.32.3\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/quayio-production-s3/sha256/7b/7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20240208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240208T232148Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=0fbb36db5aeca1e6c97d8ebf37f99f01c5386d9d2992001341a7f86f67d464c7&cf_sign=MS67eQ5Xd5Wyno5paiDhvLrk2tq35Q9YkUw8pAQlwJGuCuCvUjvEjPnMWxQn%2FMZnj%2BVfuNCch2w%2BbDjoA6T%2B63f2tcnGv8nEGVmHulG91oIq5s%2BELFbVVfxQzwUciZlFIgfNfCu9l5xUiY%2FTDgw5Lph5iaa2qYYDkI4BzXm5eP3Fal0P5iHTFnkP4Y%2BysrPeci84cSX1AfhDLOM7YkaqGJVFX8%2BcWelb6SFn53eFrAF5xbLilXecY9hxOsPsr7zv14sspe7TqLt3iaiKQpyCiGJkS7zAB60pYsR32A7mG189Rswjvg6ygYat6gD%2BaWfD4FrQlKnu6Sh6%2Fy5RqFkq0g%3D%3D&cf_expiry=1707435108®ion=us-east-1&namespace=tigera\": dial tcp: lookup cdn03.quay.io: no such host" image="quay.io/tigera/operator:v1.32.3" Feb 8 23:21:48.258526 kubelet[2469]: E0208 23:21:48.258477 2469 kuberuntime_manager.go:1209] container &Container{Name:tigera-operator,Image:quay.io/tigera/operator:v1.32.3,Command:[operator],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:WATCH_NAMESPACE,Value:,ValueFrom:nil,},EnvVar{Name:POD_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.name,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:OPERATOR_NAME,Value:tigera-operator,ValueFrom:nil,},EnvVar{Name:TIGERA_OPERATOR_INIT_IMAGE_VERSION,Value:v1.32.3,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:var-lib-calico,ReadOnly:true,MountPath:/var/lib/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dp6zk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:nil,Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{EnvFromSource{Prefix:,ConfigMapRef:&ConfigMapEnvSource{LocalObjectReference:LocalObjectReference{Name:kubernetes-services-endpoint,},Optional:*true,},SecretRef:nil,},},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod tigera-operator-55585899bf-ppqrd_tigera-operator(f617c54c-be98-4897-b03b-480a3af7b250): ErrImagePull: failed to pull and unpack image "quay.io/tigera/operator:v1.32.3": failed to copy: httpReadSeeker: failed open: failed to do request: Get "https://cdn03.quay.io/quayio-production-s3/sha256/7b/7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20240208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240208T232148Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=0fbb36db5aeca1e6c97d8ebf37f99f01c5386d9d2992001341a7f86f67d464c7&cf_sign=MS67eQ5Xd5Wyno5paiDhvLrk2tq35Q9YkUw8pAQlwJGuCuCvUjvEjPnMWxQn%2FMZnj%2BVfuNCch2w%2BbDjoA6T%2B63f2tcnGv8nEGVmHulG91oIq5s%2BELFbVVfxQzwUciZlFIgfNfCu9l5xUiY%2FTDgw5Lph5iaa2qYYDkI4BzXm5eP3Fal0P5iHTFnkP4Y%2BysrPeci84cSX1AfhDLOM7YkaqGJVFX8%2BcWelb6SFn53eFrAF5xbLilXecY9hxOsPsr7zv14sspe7TqLt3iaiKQpyCiGJkS7zAB60pYsR32A7mG189Rswjvg6ygYat6gD%2BaWfD4FrQlKnu6Sh6%2Fy5RqFkq0g%3D%3D&cf_expiry=1707435108®ion=us-east-1&namespace=tigera": dial tcp: lookup cdn03.quay.io: no such host Feb 8 23:21:48.258662 kubelet[2469]: E0208 23:21:48.258588 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/tigera/operator:v1.32.3\\\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \\\"https://cdn03.quay.io/quayio-production-s3/sha256/7b/7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20240208%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240208T232148Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=0fbb36db5aeca1e6c97d8ebf37f99f01c5386d9d2992001341a7f86f67d464c7&cf_sign=MS67eQ5Xd5Wyno5paiDhvLrk2tq35Q9YkUw8pAQlwJGuCuCvUjvEjPnMWxQn%2FMZnj%2BVfuNCch2w%2BbDjoA6T%2B63f2tcnGv8nEGVmHulG91oIq5s%2BELFbVVfxQzwUciZlFIgfNfCu9l5xUiY%2FTDgw5Lph5iaa2qYYDkI4BzXm5eP3Fal0P5iHTFnkP4Y%2BysrPeci84cSX1AfhDLOM7YkaqGJVFX8%2BcWelb6SFn53eFrAF5xbLilXecY9hxOsPsr7zv14sspe7TqLt3iaiKQpyCiGJkS7zAB60pYsR32A7mG189Rswjvg6ygYat6gD%2BaWfD4FrQlKnu6Sh6%2Fy5RqFkq0g%3D%3D&cf_expiry=1707435108®ion=us-east-1&namespace=tigera\\\": dial tcp: lookup cdn03.quay.io: no such host\"" pod="tigera-operator/tigera-operator-55585899bf-ppqrd" podUID="f617c54c-be98-4897-b03b-480a3af7b250" Feb 8 23:21:49.024838 kubelet[2469]: E0208 23:21:49.024796 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/tigera/operator:v1.32.3\\\"\"" pod="tigera-operator/tigera-operator-55585899bf-ppqrd" podUID="f617c54c-be98-4897-b03b-480a3af7b250" Feb 8 23:21:59.951704 env[1351]: time="2024-02-08T23:21:59.951641243Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 8 23:22:01.195061 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1997382592.mount: Deactivated successfully. Feb 8 23:22:02.264857 env[1351]: time="2024-02-08T23:22:02.264809710Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:02.271936 env[1351]: time="2024-02-08T23:22:02.271900878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:02.279281 env[1351]: time="2024-02-08T23:22:02.279245249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:02.285794 env[1351]: time="2024-02-08T23:22:02.285759812Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:02.286457 env[1351]: time="2024-02-08T23:22:02.286403219Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 8 23:22:02.289355 env[1351]: time="2024-02-08T23:22:02.288802442Z" level=info msg="CreateContainer within sandbox \"04af637a1f183c4d440f3abb6b8adc5706bbf26b01c554e74053d57d8755d297\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 8 23:22:02.318707 env[1351]: time="2024-02-08T23:22:02.318670130Z" level=info msg="CreateContainer within sandbox \"04af637a1f183c4d440f3abb6b8adc5706bbf26b01c554e74053d57d8755d297\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"daf8dfbb204fa97411ece2718c095fc46fee91bb55db813c0a7e780d569f60d3\"" Feb 8 23:22:02.319174 env[1351]: time="2024-02-08T23:22:02.319084634Z" level=info msg="StartContainer for \"daf8dfbb204fa97411ece2718c095fc46fee91bb55db813c0a7e780d569f60d3\"" Feb 8 23:22:02.347828 systemd[1]: Started cri-containerd-daf8dfbb204fa97411ece2718c095fc46fee91bb55db813c0a7e780d569f60d3.scope. Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.369008 kernel: kauditd_printk_skb: 312 callbacks suppressed Feb 8 23:22:02.369075 kernel: audit: type=1400 audit(1707434522.363:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396569 kernel: audit: type=1400 audit(1707434522.363:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396626 kernel: audit: type=1400 audit(1707434522.363:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423510 kernel: audit: type=1400 audit(1707434522.363:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.451228 kernel: audit: type=1400 audit(1707434522.363:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.451326 kernel: audit: type=1400 audit(1707434522.363:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.465509 kernel: audit: type=1400 audit(1707434522.363:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.485497 kernel: audit: type=1400 audit(1707434522.363:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.485569 kernel: audit: type=1400 audit(1707434522.363:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.363000 audit: BPF prog-id=124 op=LOAD Feb 8 23:22:02.512321 kernel: audit: type=1400 audit(1707434522.363:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2609 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663864666262323034666139373431316563653237313863303935 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2609 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663864666262323034666139373431316563653237313863303935 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.365000 audit: BPF prog-id=125 op=LOAD Feb 8 23:22:02.365000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00030ef20 items=0 ppid=2609 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:02.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663864666262323034666139373431316563653237313863303935 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.396000 audit: BPF prog-id=126 op=LOAD Feb 8 23:22:02.396000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00030ef68 items=0 ppid=2609 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:02.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663864666262323034666139373431316563653237313863303935 Feb 8 23:22:02.423000 audit: BPF prog-id=126 op=UNLOAD Feb 8 23:22:02.423000 audit: BPF prog-id=125 op=UNLOAD Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:02.423000 audit: BPF prog-id=127 op=LOAD Feb 8 23:22:02.423000 audit[2791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00030f378 items=0 ppid=2609 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:02.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663864666262323034666139373431316563653237313863303935 Feb 8 23:22:02.514536 env[1351]: time="2024-02-08T23:22:02.513733814Z" level=info msg="StartContainer for \"daf8dfbb204fa97411ece2718c095fc46fee91bb55db813c0a7e780d569f60d3\" returns successfully" Feb 8 23:22:03.307516 systemd[1]: run-containerd-runc-k8s.io-daf8dfbb204fa97411ece2718c095fc46fee91bb55db813c0a7e780d569f60d3-runc.18MhTs.mount: Deactivated successfully. Feb 8 23:22:04.312000 audit[2825]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:04.312000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffefec36af0 a2=0 a3=7ffefec36adc items=0 ppid=2624 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:04.313000 audit[2825]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:04.313000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffefec36af0 a2=0 a3=31030 items=0 ppid=2624 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:04.320000 audit[2827]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:04.320000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd01220560 a2=0 a3=7ffd0122054c items=0 ppid=2624 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:04.321000 audit[2827]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:04.321000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd01220560 a2=0 a3=31030 items=0 ppid=2624 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:04.448880 kubelet[2469]: I0208 23:22:04.448839 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-ppqrd" podStartSLOduration=3.431789673 podCreationTimestamp="2024-02-08 23:21:46 +0000 UTC" firstStartedPulling="2024-02-08 23:21:47.27014175 +0000 UTC m=+14.512671521" lastFinishedPulling="2024-02-08 23:22:02.287149426 +0000 UTC m=+29.529679197" observedRunningTime="2024-02-08 23:22:03.056723149 +0000 UTC m=+30.299252920" watchObservedRunningTime="2024-02-08 23:22:04.448797349 +0000 UTC m=+31.691327220" Feb 8 23:22:04.449367 kubelet[2469]: I0208 23:22:04.449016 2469 topology_manager.go:215] "Topology Admit Handler" podUID="a00fa057-eea0-499c-b4ca-84e7ed2c08ec" podNamespace="calico-system" podName="calico-typha-54d664f44-g9cqr" Feb 8 23:22:04.455737 systemd[1]: Created slice kubepods-besteffort-poda00fa057_eea0_499c_b4ca_84e7ed2c08ec.slice. Feb 8 23:22:04.528455 kubelet[2469]: I0208 23:22:04.528410 2469 topology_manager.go:215] "Topology Admit Handler" podUID="3de5fb38-809e-4934-abcc-423dbeb583e3" podNamespace="calico-system" podName="calico-node-j45fk" Feb 8 23:22:04.534460 systemd[1]: Created slice kubepods-besteffort-pod3de5fb38_809e_4934_abcc_423dbeb583e3.slice. Feb 8 23:22:04.623052 kubelet[2469]: I0208 23:22:04.622917 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2w8f\" (UniqueName: \"kubernetes.io/projected/a00fa057-eea0-499c-b4ca-84e7ed2c08ec-kube-api-access-k2w8f\") pod \"calico-typha-54d664f44-g9cqr\" (UID: \"a00fa057-eea0-499c-b4ca-84e7ed2c08ec\") " pod="calico-system/calico-typha-54d664f44-g9cqr" Feb 8 23:22:04.623052 kubelet[2469]: I0208 23:22:04.622985 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a00fa057-eea0-499c-b4ca-84e7ed2c08ec-tigera-ca-bundle\") pod \"calico-typha-54d664f44-g9cqr\" (UID: \"a00fa057-eea0-499c-b4ca-84e7ed2c08ec\") " pod="calico-system/calico-typha-54d664f44-g9cqr" Feb 8 23:22:04.623369 kubelet[2469]: I0208 23:22:04.623056 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a00fa057-eea0-499c-b4ca-84e7ed2c08ec-typha-certs\") pod \"calico-typha-54d664f44-g9cqr\" (UID: \"a00fa057-eea0-499c-b4ca-84e7ed2c08ec\") " pod="calico-system/calico-typha-54d664f44-g9cqr" Feb 8 23:22:04.648241 kubelet[2469]: I0208 23:22:04.648203 2469 topology_manager.go:215] "Topology Admit Handler" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" podNamespace="calico-system" podName="csi-node-driver-qbksc" Feb 8 23:22:04.648548 kubelet[2469]: E0208 23:22:04.648526 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:04.723817 kubelet[2469]: I0208 23:22:04.723779 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-xtables-lock\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724071 kubelet[2469]: I0208 23:22:04.724053 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-cni-net-dir\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724288 kubelet[2469]: I0208 23:22:04.724270 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-var-lib-calico\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724372 kubelet[2469]: I0208 23:22:04.724308 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fe14a064-ff0d-4c55-9eee-3d94032b7cf6-registration-dir\") pod \"csi-node-driver-qbksc\" (UID: \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\") " pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:04.724372 kubelet[2469]: I0208 23:22:04.724335 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-policysync\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724484 kubelet[2469]: I0208 23:22:04.724382 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3de5fb38-809e-4934-abcc-423dbeb583e3-node-certs\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724484 kubelet[2469]: I0208 23:22:04.724440 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9vt9\" (UniqueName: \"kubernetes.io/projected/3de5fb38-809e-4934-abcc-423dbeb583e3-kube-api-access-l9vt9\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724484 kubelet[2469]: I0208 23:22:04.724473 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fe14a064-ff0d-4c55-9eee-3d94032b7cf6-kubelet-dir\") pod \"csi-node-driver-qbksc\" (UID: \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\") " pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:04.724610 kubelet[2469]: I0208 23:22:04.724502 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8qqtz\" (UniqueName: \"kubernetes.io/projected/fe14a064-ff0d-4c55-9eee-3d94032b7cf6-kube-api-access-8qqtz\") pod \"csi-node-driver-qbksc\" (UID: \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\") " pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:04.724610 kubelet[2469]: I0208 23:22:04.724551 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-lib-modules\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724610 kubelet[2469]: I0208 23:22:04.724586 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-flexvol-driver-host\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724727 kubelet[2469]: I0208 23:22:04.724616 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fe14a064-ff0d-4c55-9eee-3d94032b7cf6-socket-dir\") pod \"csi-node-driver-qbksc\" (UID: \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\") " pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:04.724727 kubelet[2469]: I0208 23:22:04.724648 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-cni-bin-dir\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724727 kubelet[2469]: I0208 23:22:04.724676 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-cni-log-dir\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724727 kubelet[2469]: I0208 23:22:04.724704 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fe14a064-ff0d-4c55-9eee-3d94032b7cf6-varrun\") pod \"csi-node-driver-qbksc\" (UID: \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\") " pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:04.724881 kubelet[2469]: I0208 23:22:04.724735 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3de5fb38-809e-4934-abcc-423dbeb583e3-tigera-ca-bundle\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.724881 kubelet[2469]: I0208 23:22:04.724791 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3de5fb38-809e-4934-abcc-423dbeb583e3-var-run-calico\") pod \"calico-node-j45fk\" (UID: \"3de5fb38-809e-4934-abcc-423dbeb583e3\") " pod="calico-system/calico-node-j45fk" Feb 8 23:22:04.761872 env[1351]: time="2024-02-08T23:22:04.761401352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54d664f44-g9cqr,Uid:a00fa057-eea0-499c-b4ca-84e7ed2c08ec,Namespace:calico-system,Attempt:0,}" Feb 8 23:22:04.814335 env[1351]: time="2024-02-08T23:22:04.814267443Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:22:04.814335 env[1351]: time="2024-02-08T23:22:04.814304643Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:22:04.814589 env[1351]: time="2024-02-08T23:22:04.814318243Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:22:04.814855 env[1351]: time="2024-02-08T23:22:04.814788248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57598082e9c1f39a6a2218e35cbd4ed15b64b4ca1dea57cd5d467345a8671965 pid=2837 runtime=io.containerd.runc.v2 Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828351 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.829270 kubelet[2469]: W0208 23:22:04.828372 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828397 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828644 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.829270 kubelet[2469]: W0208 23:22:04.828654 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828679 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828851 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.829270 kubelet[2469]: W0208 23:22:04.828860 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.828882 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.829096 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.829270 kubelet[2469]: W0208 23:22:04.829105 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.829270 kubelet[2469]: E0208 23:22:04.829129 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.830032 kubelet[2469]: E0208 23:22:04.829499 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.830032 kubelet[2469]: W0208 23:22:04.829510 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.830032 kubelet[2469]: E0208 23:22:04.829533 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.830380 kubelet[2469]: E0208 23:22:04.830277 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.830380 kubelet[2469]: W0208 23:22:04.830297 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.830380 kubelet[2469]: E0208 23:22:04.830330 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.830678 kubelet[2469]: E0208 23:22:04.830668 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.830752 kubelet[2469]: W0208 23:22:04.830742 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.830855 kubelet[2469]: E0208 23:22:04.830840 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.831068 kubelet[2469]: E0208 23:22:04.831057 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.831157 kubelet[2469]: W0208 23:22:04.831146 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.831251 kubelet[2469]: E0208 23:22:04.831236 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.831490 kubelet[2469]: E0208 23:22:04.831478 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.831576 kubelet[2469]: W0208 23:22:04.831564 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.831670 kubelet[2469]: E0208 23:22:04.831655 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.831890 kubelet[2469]: E0208 23:22:04.831878 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.831983 kubelet[2469]: W0208 23:22:04.831969 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.832083 kubelet[2469]: E0208 23:22:04.832066 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.832296 kubelet[2469]: E0208 23:22:04.832285 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.832385 kubelet[2469]: W0208 23:22:04.832374 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.832663 kubelet[2469]: E0208 23:22:04.832652 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.832762 kubelet[2469]: W0208 23:22:04.832748 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.832992 kubelet[2469]: E0208 23:22:04.832981 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.835489 kubelet[2469]: W0208 23:22:04.835468 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.835763 kubelet[2469]: E0208 23:22:04.835751 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.835861 kubelet[2469]: W0208 23:22:04.835849 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.836101 kubelet[2469]: E0208 23:22:04.836090 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.836180 kubelet[2469]: W0208 23:22:04.836170 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.836260 kubelet[2469]: E0208 23:22:04.836251 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.836544 kubelet[2469]: E0208 23:22:04.836531 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.836629 kubelet[2469]: W0208 23:22:04.836616 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.836704 kubelet[2469]: E0208 23:22:04.836695 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.836978 kubelet[2469]: E0208 23:22:04.836967 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.837067 kubelet[2469]: W0208 23:22:04.837056 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.837143 kubelet[2469]: E0208 23:22:04.837133 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.837270 kubelet[2469]: E0208 23:22:04.837258 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.841658 kubelet[2469]: E0208 23:22:04.840640 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.841658 kubelet[2469]: E0208 23:22:04.840662 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.841658 kubelet[2469]: E0208 23:22:04.840684 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.841945 kubelet[2469]: E0208 23:22:04.841933 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.842026 kubelet[2469]: W0208 23:22:04.842013 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.842127 kubelet[2469]: E0208 23:22:04.842116 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.842376 kubelet[2469]: E0208 23:22:04.842363 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.842506 kubelet[2469]: W0208 23:22:04.842490 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.842590 kubelet[2469]: E0208 23:22:04.842581 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.842831 kubelet[2469]: E0208 23:22:04.842820 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.842924 kubelet[2469]: W0208 23:22:04.842912 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.843011 kubelet[2469]: E0208 23:22:04.842999 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.843262 kubelet[2469]: E0208 23:22:04.843250 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.843380 kubelet[2469]: W0208 23:22:04.843369 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.843482 kubelet[2469]: E0208 23:22:04.843472 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.843757 kubelet[2469]: E0208 23:22:04.843744 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.843851 kubelet[2469]: W0208 23:22:04.843839 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.843936 kubelet[2469]: E0208 23:22:04.843927 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.844213 kubelet[2469]: E0208 23:22:04.844200 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.844308 kubelet[2469]: W0208 23:22:04.844296 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.844386 kubelet[2469]: E0208 23:22:04.844377 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.845705 kubelet[2469]: E0208 23:22:04.845690 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.845796 kubelet[2469]: W0208 23:22:04.845784 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.845950 kubelet[2469]: E0208 23:22:04.845936 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.846262 kubelet[2469]: E0208 23:22:04.846247 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.846341 kubelet[2469]: W0208 23:22:04.846330 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.846412 kubelet[2469]: E0208 23:22:04.846401 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.849512 kubelet[2469]: E0208 23:22:04.849498 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.849621 kubelet[2469]: W0208 23:22:04.849609 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.849712 kubelet[2469]: E0208 23:22:04.849702 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.853377 systemd[1]: Started cri-containerd-57598082e9c1f39a6a2218e35cbd4ed15b64b4ca1dea57cd5d467345a8671965.scope. Feb 8 23:22:04.861209 kubelet[2469]: E0208 23:22:04.861195 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.861313 kubelet[2469]: W0208 23:22:04.861301 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.861395 kubelet[2469]: E0208 23:22:04.861386 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.875563 kubelet[2469]: E0208 23:22:04.875497 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:04.875680 kubelet[2469]: W0208 23:22:04.875667 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:04.875757 kubelet[2469]: E0208 23:22:04.875748 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.891000 audit: BPF prog-id=128 op=LOAD Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353938303832653963316633396136613232313865333563626434 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353938303832653963316633396136613232313865333563626434 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit: BPF prog-id=129 op=LOAD Feb 8 23:22:04.892000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031a340 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353938303832653963316633396136613232313865333563626434 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit: BPF prog-id=130 op=LOAD Feb 8 23:22:04.892000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031a388 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353938303832653963316633396136613232313865333563626434 Feb 8 23:22:04.892000 audit: BPF prog-id=130 op=UNLOAD Feb 8 23:22:04.892000 audit: BPF prog-id=129 op=UNLOAD Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:04.892000 audit: BPF prog-id=131 op=LOAD Feb 8 23:22:04.892000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031a798 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:04.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537353938303832653963316633396136613232313865333563626434 Feb 8 23:22:04.939353 env[1351]: time="2024-02-08T23:22:04.939306004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54d664f44-g9cqr,Uid:a00fa057-eea0-499c-b4ca-84e7ed2c08ec,Namespace:calico-system,Attempt:0,} returns sandbox id \"57598082e9c1f39a6a2218e35cbd4ed15b64b4ca1dea57cd5d467345a8671965\"" Feb 8 23:22:04.941586 env[1351]: time="2024-02-08T23:22:04.941551925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 8 23:22:05.138120 env[1351]: time="2024-02-08T23:22:05.137985924Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j45fk,Uid:3de5fb38-809e-4934-abcc-423dbeb583e3,Namespace:calico-system,Attempt:0,}" Feb 8 23:22:05.181282 env[1351]: time="2024-02-08T23:22:05.181207418Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:22:05.181483 env[1351]: time="2024-02-08T23:22:05.181249218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:22:05.181483 env[1351]: time="2024-02-08T23:22:05.181308519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:22:05.181599 env[1351]: time="2024-02-08T23:22:05.181470921Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818 pid=2906 runtime=io.containerd.runc.v2 Feb 8 23:22:05.200400 systemd[1]: Started cri-containerd-7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818.scope. Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.218000 audit: BPF prog-id=132 op=LOAD Feb 8 23:22:05.218000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.218000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2906 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303837613134633065373034653264323066313032633865316537 Feb 8 23:22:05.218000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.218000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2906 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303837613134633065373034653264323066313032633865316537 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.219000 audit: BPF prog-id=133 op=LOAD Feb 8 23:22:05.219000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000a2d30 items=0 ppid=2906 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303837613134633065373034653264323066313032633865316537 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.220000 audit: BPF prog-id=134 op=LOAD Feb 8 23:22:05.220000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000a2d78 items=0 ppid=2906 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303837613134633065373034653264323066313032633865316537 Feb 8 23:22:05.221000 audit: BPF prog-id=134 op=UNLOAD Feb 8 23:22:05.221000 audit: BPF prog-id=133 op=UNLOAD Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { perfmon } for pid=2916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit[2916]: AVC avc: denied { bpf } for pid=2916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:05.221000 audit: BPF prog-id=135 op=LOAD Feb 8 23:22:05.221000 audit[2916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000a3188 items=0 ppid=2906 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764303837613134633065373034653264323066313032633865316537 Feb 8 23:22:05.235370 env[1351]: time="2024-02-08T23:22:05.235316111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j45fk,Uid:3de5fb38-809e-4934-abcc-423dbeb583e3,Namespace:calico-system,Attempt:0,} returns sandbox id \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\"" Feb 8 23:22:05.333000 audit[2939]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:05.333000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe865c7860 a2=0 a3=7ffe865c784c items=0 ppid=2624 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:05.333000 audit[2939]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:05.333000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe865c7860 a2=0 a3=31030 items=0 ppid=2624 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:05.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:05.949273 kubelet[2469]: E0208 23:22:05.949220 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:07.135354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1115155761.mount: Deactivated successfully. Feb 8 23:22:07.949946 kubelet[2469]: E0208 23:22:07.949882 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:09.669521 env[1351]: time="2024-02-08T23:22:09.669470845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:09.678596 env[1351]: time="2024-02-08T23:22:09.678553622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:09.683376 env[1351]: time="2024-02-08T23:22:09.683339662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:09.689134 env[1351]: time="2024-02-08T23:22:09.689096011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:09.689468 env[1351]: time="2024-02-08T23:22:09.689417914Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 8 23:22:09.690852 env[1351]: time="2024-02-08T23:22:09.690817726Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 8 23:22:09.707486 env[1351]: time="2024-02-08T23:22:09.707248464Z" level=info msg="CreateContainer within sandbox \"57598082e9c1f39a6a2218e35cbd4ed15b64b4ca1dea57cd5d467345a8671965\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 8 23:22:09.733190 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1838252716.mount: Deactivated successfully. Feb 8 23:22:09.749741 env[1351]: time="2024-02-08T23:22:09.749699723Z" level=info msg="CreateContainer within sandbox \"57598082e9c1f39a6a2218e35cbd4ed15b64b4ca1dea57cd5d467345a8671965\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"bce9131b708a9aa2fa6dbe3f0489ff1f9c8f2d1e315387b9fc5bf81d7687a222\"" Feb 8 23:22:09.751699 env[1351]: time="2024-02-08T23:22:09.750219428Z" level=info msg="StartContainer for \"bce9131b708a9aa2fa6dbe3f0489ff1f9c8f2d1e315387b9fc5bf81d7687a222\"" Feb 8 23:22:09.773113 systemd[1]: Started cri-containerd-bce9131b708a9aa2fa6dbe3f0489ff1f9c8f2d1e315387b9fc5bf81d7687a222.scope. Feb 8 23:22:09.798144 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 8 23:22:09.798281 kernel: audit: type=1400 audit(1707434529.787:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.820039 kernel: audit: type=1400 audit(1707434529.787:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.836552 kernel: audit: type=1400 audit(1707434529.787:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.855850 kernel: audit: type=1400 audit(1707434529.787:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.871518 kernel: audit: type=1400 audit(1707434529.787:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.886907 kernel: audit: type=1400 audit(1707434529.787:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.901097 kernel: audit: type=1400 audit(1707434529.787:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.915238 kernel: audit: type=1400 audit(1707434529.787:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.916855 env[1351]: time="2024-02-08T23:22:09.915644825Z" level=info msg="StartContainer for \"bce9131b708a9aa2fa6dbe3f0489ff1f9c8f2d1e315387b9fc5bf81d7687a222\" returns successfully" Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.943327 kernel: audit: type=1400 audit(1707434529.787:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.943412 kernel: audit: type=1400 audit(1707434529.787:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.787000 audit: BPF prog-id=136 op=LOAD Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2837 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:09.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653931333162373038613961613266613664626533663034383966 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2837 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:09.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653931333162373038613961613266613664626533663034383966 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.798000 audit: BPF prog-id=137 op=LOAD Feb 8 23:22:09.798000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001f7db0 items=0 ppid=2837 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:09.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653931333162373038613961613266613664626533663034383966 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.806000 audit: BPF prog-id=138 op=LOAD Feb 8 23:22:09.806000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001f7df8 items=0 ppid=2837 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:09.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653931333162373038613961613266613664626533663034383966 Feb 8 23:22:09.819000 audit: BPF prog-id=138 op=UNLOAD Feb 8 23:22:09.819000 audit: BPF prog-id=137 op=UNLOAD Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:09.819000 audit: BPF prog-id=139 op=LOAD Feb 8 23:22:09.819000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b8208 items=0 ppid=2837 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:09.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263653931333162373038613961613266613664626533663034383966 Feb 8 23:22:09.949862 kubelet[2469]: E0208 23:22:09.949828 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:10.072897 kubelet[2469]: E0208 23:22:10.072859 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.073119 kubelet[2469]: W0208 23:22:10.073091 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.073208 kubelet[2469]: E0208 23:22:10.073125 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.073494 kubelet[2469]: E0208 23:22:10.073468 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.073494 kubelet[2469]: W0208 23:22:10.073491 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.073683 kubelet[2469]: E0208 23:22:10.073511 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.073738 kubelet[2469]: E0208 23:22:10.073709 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.073738 kubelet[2469]: W0208 23:22:10.073719 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.073738 kubelet[2469]: E0208 23:22:10.073735 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.073958 kubelet[2469]: E0208 23:22:10.073919 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.073958 kubelet[2469]: W0208 23:22:10.073928 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.073958 kubelet[2469]: E0208 23:22:10.073942 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.074137 kubelet[2469]: E0208 23:22:10.074120 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.074137 kubelet[2469]: W0208 23:22:10.074137 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.074277 kubelet[2469]: E0208 23:22:10.074152 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.074338 kubelet[2469]: E0208 23:22:10.074324 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.074338 kubelet[2469]: W0208 23:22:10.074335 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.074469 kubelet[2469]: E0208 23:22:10.074349 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.074551 kubelet[2469]: E0208 23:22:10.074537 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.074623 kubelet[2469]: W0208 23:22:10.074552 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.074623 kubelet[2469]: E0208 23:22:10.074568 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.074758 kubelet[2469]: E0208 23:22:10.074744 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.074825 kubelet[2469]: W0208 23:22:10.074759 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.074825 kubelet[2469]: E0208 23:22:10.074773 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.074970 kubelet[2469]: E0208 23:22:10.074955 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.075048 kubelet[2469]: W0208 23:22:10.074970 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.075048 kubelet[2469]: E0208 23:22:10.074984 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.075167 kubelet[2469]: E0208 23:22:10.075154 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.075167 kubelet[2469]: W0208 23:22:10.075166 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.075278 kubelet[2469]: E0208 23:22:10.075180 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.075380 kubelet[2469]: E0208 23:22:10.075350 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.075380 kubelet[2469]: W0208 23:22:10.075360 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.075380 kubelet[2469]: E0208 23:22:10.075376 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.075569 kubelet[2469]: E0208 23:22:10.075562 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.075612 kubelet[2469]: W0208 23:22:10.075572 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.075612 kubelet[2469]: E0208 23:22:10.075588 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.075760 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.077089 kubelet[2469]: W0208 23:22:10.075771 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.075786 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.075964 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.077089 kubelet[2469]: W0208 23:22:10.075974 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.075989 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.076256 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.077089 kubelet[2469]: W0208 23:22:10.076267 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.077089 kubelet[2469]: E0208 23:22:10.076282 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.087318 kubelet[2469]: I0208 23:22:10.087003 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-54d664f44-g9cqr" podStartSLOduration=1.337297755 podCreationTimestamp="2024-02-08 23:22:04 +0000 UTC" firstStartedPulling="2024-02-08 23:22:04.940928819 +0000 UTC m=+32.183458590" lastFinishedPulling="2024-02-08 23:22:09.690595424 +0000 UTC m=+36.933125295" observedRunningTime="2024-02-08 23:22:10.077968885 +0000 UTC m=+37.320498656" watchObservedRunningTime="2024-02-08 23:22:10.08696446 +0000 UTC m=+37.329494231" Feb 8 23:22:10.104000 audit[2995]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:10.104000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd14f84090 a2=0 a3=7ffd14f8407c items=0 ppid=2624 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:10.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:10.105000 audit[2995]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:10.105000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd14f84090 a2=0 a3=7ffd14f8407c items=0 ppid=2624 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:10.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:10.171366 kubelet[2469]: E0208 23:22:10.171339 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.171366 kubelet[2469]: W0208 23:22:10.171361 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.171632 kubelet[2469]: E0208 23:22:10.171387 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.171805 kubelet[2469]: E0208 23:22:10.171780 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.171909 kubelet[2469]: W0208 23:22:10.171886 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.172008 kubelet[2469]: E0208 23:22:10.171924 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.172238 kubelet[2469]: E0208 23:22:10.172218 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.172238 kubelet[2469]: W0208 23:22:10.172233 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.172403 kubelet[2469]: E0208 23:22:10.172258 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.172583 kubelet[2469]: E0208 23:22:10.172565 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.172583 kubelet[2469]: W0208 23:22:10.172580 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.172751 kubelet[2469]: E0208 23:22:10.172608 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.172886 kubelet[2469]: E0208 23:22:10.172869 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.172886 kubelet[2469]: W0208 23:22:10.172883 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.173048 kubelet[2469]: E0208 23:22:10.172986 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.173152 kubelet[2469]: E0208 23:22:10.173132 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.173152 kubelet[2469]: W0208 23:22:10.173148 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.173316 kubelet[2469]: E0208 23:22:10.173262 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.173458 kubelet[2469]: E0208 23:22:10.173417 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.173458 kubelet[2469]: W0208 23:22:10.173446 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.173614 kubelet[2469]: E0208 23:22:10.173561 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.173742 kubelet[2469]: E0208 23:22:10.173724 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.173742 kubelet[2469]: W0208 23:22:10.173739 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.173890 kubelet[2469]: E0208 23:22:10.173763 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.174074 kubelet[2469]: E0208 23:22:10.174048 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.174153 kubelet[2469]: W0208 23:22:10.174139 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.174234 kubelet[2469]: E0208 23:22:10.174222 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.174514 kubelet[2469]: E0208 23:22:10.174493 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.174615 kubelet[2469]: W0208 23:22:10.174513 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.174615 kubelet[2469]: E0208 23:22:10.174546 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.174821 kubelet[2469]: E0208 23:22:10.174804 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.174900 kubelet[2469]: W0208 23:22:10.174822 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.175070 kubelet[2469]: E0208 23:22:10.175049 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.175152 kubelet[2469]: W0208 23:22:10.175075 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.175152 kubelet[2469]: E0208 23:22:10.175096 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.175326 kubelet[2469]: E0208 23:22:10.175310 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.175454 kubelet[2469]: E0208 23:22:10.175319 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.175454 kubelet[2469]: W0208 23:22:10.175425 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.175593 kubelet[2469]: E0208 23:22:10.175477 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.175770 kubelet[2469]: E0208 23:22:10.175756 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.175868 kubelet[2469]: W0208 23:22:10.175770 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.175868 kubelet[2469]: E0208 23:22:10.175798 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.176322 kubelet[2469]: E0208 23:22:10.176304 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.176538 kubelet[2469]: W0208 23:22:10.176412 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.176538 kubelet[2469]: E0208 23:22:10.176524 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.176903 kubelet[2469]: E0208 23:22:10.176881 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.176903 kubelet[2469]: W0208 23:22:10.176897 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.177066 kubelet[2469]: E0208 23:22:10.176923 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.177382 kubelet[2469]: E0208 23:22:10.177347 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.177382 kubelet[2469]: W0208 23:22:10.177363 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.177570 kubelet[2469]: E0208 23:22:10.177387 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:10.177746 kubelet[2469]: E0208 23:22:10.177730 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:10.177831 kubelet[2469]: W0208 23:22:10.177817 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:10.177913 kubelet[2469]: E0208 23:22:10.177898 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.084713 kubelet[2469]: E0208 23:22:11.084650 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.084713 kubelet[2469]: W0208 23:22:11.084699 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.085659 kubelet[2469]: E0208 23:22:11.084757 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.085659 kubelet[2469]: E0208 23:22:11.085313 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.085659 kubelet[2469]: W0208 23:22:11.085324 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.085659 kubelet[2469]: E0208 23:22:11.085341 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.085659 kubelet[2469]: E0208 23:22:11.085545 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.085659 kubelet[2469]: W0208 23:22:11.085555 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.085659 kubelet[2469]: E0208 23:22:11.085570 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.085994 kubelet[2469]: E0208 23:22:11.085746 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.085994 kubelet[2469]: W0208 23:22:11.085755 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.085994 kubelet[2469]: E0208 23:22:11.085770 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.085994 kubelet[2469]: E0208 23:22:11.085950 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.085994 kubelet[2469]: W0208 23:22:11.085958 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.085994 kubelet[2469]: E0208 23:22:11.085973 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.086273 kubelet[2469]: E0208 23:22:11.086136 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.086273 kubelet[2469]: W0208 23:22:11.086144 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.086273 kubelet[2469]: E0208 23:22:11.086158 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.086415 kubelet[2469]: E0208 23:22:11.086319 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.086415 kubelet[2469]: W0208 23:22:11.086327 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.086415 kubelet[2469]: E0208 23:22:11.086341 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.086589 kubelet[2469]: E0208 23:22:11.086549 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.086589 kubelet[2469]: W0208 23:22:11.086559 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.086589 kubelet[2469]: E0208 23:22:11.086575 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.086775 kubelet[2469]: E0208 23:22:11.086760 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.086830 kubelet[2469]: W0208 23:22:11.086776 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.086830 kubelet[2469]: E0208 23:22:11.086790 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.086982 kubelet[2469]: E0208 23:22:11.086963 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.086982 kubelet[2469]: W0208 23:22:11.086976 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.087103 kubelet[2469]: E0208 23:22:11.086992 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.087179 kubelet[2469]: E0208 23:22:11.087163 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.087179 kubelet[2469]: W0208 23:22:11.087175 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.087278 kubelet[2469]: E0208 23:22:11.087190 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.087442 kubelet[2469]: E0208 23:22:11.087416 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.087547 kubelet[2469]: W0208 23:22:11.087448 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.087547 kubelet[2469]: E0208 23:22:11.087470 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.087698 kubelet[2469]: E0208 23:22:11.087677 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.087698 kubelet[2469]: W0208 23:22:11.087696 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.087817 kubelet[2469]: E0208 23:22:11.087711 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.087903 kubelet[2469]: E0208 23:22:11.087877 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.087903 kubelet[2469]: W0208 23:22:11.087899 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.088093 kubelet[2469]: E0208 23:22:11.087914 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.088144 kubelet[2469]: E0208 23:22:11.088104 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.088144 kubelet[2469]: W0208 23:22:11.088113 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.088144 kubelet[2469]: E0208 23:22:11.088128 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.181244 kubelet[2469]: E0208 23:22:11.181215 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.181244 kubelet[2469]: W0208 23:22:11.181233 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.181504 kubelet[2469]: E0208 23:22:11.181257 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.181601 kubelet[2469]: E0208 23:22:11.181585 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.181601 kubelet[2469]: W0208 23:22:11.181600 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.181721 kubelet[2469]: E0208 23:22:11.181621 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.181915 kubelet[2469]: E0208 23:22:11.181897 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.181915 kubelet[2469]: W0208 23:22:11.181909 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.182082 kubelet[2469]: E0208 23:22:11.181929 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.182158 kubelet[2469]: E0208 23:22:11.182140 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.182158 kubelet[2469]: W0208 23:22:11.182154 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.182305 kubelet[2469]: E0208 23:22:11.182173 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.182382 kubelet[2469]: E0208 23:22:11.182365 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.182460 kubelet[2469]: W0208 23:22:11.182381 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.182460 kubelet[2469]: E0208 23:22:11.182401 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.182661 kubelet[2469]: E0208 23:22:11.182645 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.182661 kubelet[2469]: W0208 23:22:11.182660 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.182783 kubelet[2469]: E0208 23:22:11.182741 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.182900 kubelet[2469]: E0208 23:22:11.182884 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.182984 kubelet[2469]: W0208 23:22:11.182902 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.183050 kubelet[2469]: E0208 23:22:11.182984 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.183114 kubelet[2469]: E0208 23:22:11.183101 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.183170 kubelet[2469]: W0208 23:22:11.183115 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.183243 kubelet[2469]: E0208 23:22:11.183194 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.183323 kubelet[2469]: E0208 23:22:11.183309 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.183392 kubelet[2469]: W0208 23:22:11.183323 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.183392 kubelet[2469]: E0208 23:22:11.183342 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.183789 kubelet[2469]: E0208 23:22:11.183770 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.183789 kubelet[2469]: W0208 23:22:11.183787 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.183946 kubelet[2469]: E0208 23:22:11.183806 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.183995 kubelet[2469]: E0208 23:22:11.183986 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.184049 kubelet[2469]: W0208 23:22:11.183995 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.184049 kubelet[2469]: E0208 23:22:11.184014 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.184548 kubelet[2469]: E0208 23:22:11.184519 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.184638 kubelet[2469]: W0208 23:22:11.184549 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.184638 kubelet[2469]: E0208 23:22:11.184571 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.184851 kubelet[2469]: E0208 23:22:11.184833 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.184851 kubelet[2469]: W0208 23:22:11.184849 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.184972 kubelet[2469]: E0208 23:22:11.184940 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.185314 kubelet[2469]: E0208 23:22:11.185297 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.185314 kubelet[2469]: W0208 23:22:11.185313 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.185507 kubelet[2469]: E0208 23:22:11.185332 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.185584 kubelet[2469]: E0208 23:22:11.185571 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.185642 kubelet[2469]: W0208 23:22:11.185586 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.185642 kubelet[2469]: E0208 23:22:11.185605 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.185861 kubelet[2469]: E0208 23:22:11.185836 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.185861 kubelet[2469]: W0208 23:22:11.185852 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.185973 kubelet[2469]: E0208 23:22:11.185872 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.186703 kubelet[2469]: E0208 23:22:11.186686 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.186703 kubelet[2469]: W0208 23:22:11.186699 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.186841 kubelet[2469]: E0208 23:22:11.186786 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.186966 kubelet[2469]: E0208 23:22:11.186951 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:11.186966 kubelet[2469]: W0208 23:22:11.186962 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:11.187058 kubelet[2469]: E0208 23:22:11.186978 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:11.949599 kubelet[2469]: E0208 23:22:11.949531 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:12.096351 kubelet[2469]: E0208 23:22:12.096311 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.096351 kubelet[2469]: W0208 23:22:12.096350 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.097059 kubelet[2469]: E0208 23:22:12.096380 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.097059 kubelet[2469]: E0208 23:22:12.096722 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.097059 kubelet[2469]: W0208 23:22:12.096735 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.097059 kubelet[2469]: E0208 23:22:12.096769 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.097059 kubelet[2469]: E0208 23:22:12.097000 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.097059 kubelet[2469]: W0208 23:22:12.097021 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.097059 kubelet[2469]: E0208 23:22:12.097041 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.097545 kubelet[2469]: E0208 23:22:12.097262 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.097545 kubelet[2469]: W0208 23:22:12.097274 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.097545 kubelet[2469]: E0208 23:22:12.097301 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.097545 kubelet[2469]: E0208 23:22:12.097544 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.097793 kubelet[2469]: W0208 23:22:12.097556 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.097793 kubelet[2469]: E0208 23:22:12.097574 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.097793 kubelet[2469]: E0208 23:22:12.097782 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.097793 kubelet[2469]: W0208 23:22:12.097791 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.098053 kubelet[2469]: E0208 23:22:12.097808 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.098053 kubelet[2469]: E0208 23:22:12.098030 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.098053 kubelet[2469]: W0208 23:22:12.098041 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.098252 kubelet[2469]: E0208 23:22:12.098075 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.098317 kubelet[2469]: E0208 23:22:12.098298 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.098317 kubelet[2469]: W0208 23:22:12.098309 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.098453 kubelet[2469]: E0208 23:22:12.098337 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.098653 kubelet[2469]: E0208 23:22:12.098624 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.098742 kubelet[2469]: W0208 23:22:12.098654 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.098742 kubelet[2469]: E0208 23:22:12.098674 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.098938 kubelet[2469]: E0208 23:22:12.098909 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.098938 kubelet[2469]: W0208 23:22:12.098938 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.099099 kubelet[2469]: E0208 23:22:12.098959 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.099183 kubelet[2469]: E0208 23:22:12.099164 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.099250 kubelet[2469]: W0208 23:22:12.099184 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.099250 kubelet[2469]: E0208 23:22:12.099202 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.099416 kubelet[2469]: E0208 23:22:12.099397 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.099416 kubelet[2469]: W0208 23:22:12.099414 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.099591 kubelet[2469]: E0208 23:22:12.099452 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.099692 kubelet[2469]: E0208 23:22:12.099663 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.099692 kubelet[2469]: W0208 23:22:12.099680 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.099847 kubelet[2469]: E0208 23:22:12.099699 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.099927 kubelet[2469]: E0208 23:22:12.099908 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.099927 kubelet[2469]: W0208 23:22:12.099926 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.100082 kubelet[2469]: E0208 23:22:12.099944 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.100171 kubelet[2469]: E0208 23:22:12.100150 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.100171 kubelet[2469]: W0208 23:22:12.100169 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.100297 kubelet[2469]: E0208 23:22:12.100187 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.190401 kubelet[2469]: E0208 23:22:12.190322 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.190401 kubelet[2469]: W0208 23:22:12.190368 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.190779 kubelet[2469]: E0208 23:22:12.190422 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.190872 kubelet[2469]: E0208 23:22:12.190851 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.190940 kubelet[2469]: W0208 23:22:12.190873 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.190940 kubelet[2469]: E0208 23:22:12.190898 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.191220 kubelet[2469]: E0208 23:22:12.191200 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.191220 kubelet[2469]: W0208 23:22:12.191214 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.191404 kubelet[2469]: E0208 23:22:12.191242 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.191536 kubelet[2469]: E0208 23:22:12.191514 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.191622 kubelet[2469]: W0208 23:22:12.191534 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.191622 kubelet[2469]: E0208 23:22:12.191560 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.191791 kubelet[2469]: E0208 23:22:12.191772 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.191791 kubelet[2469]: W0208 23:22:12.191789 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.191946 kubelet[2469]: E0208 23:22:12.191807 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.192016 kubelet[2469]: E0208 23:22:12.192006 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.192075 kubelet[2469]: W0208 23:22:12.192019 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.192075 kubelet[2469]: E0208 23:22:12.192037 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.192344 kubelet[2469]: E0208 23:22:12.192321 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.192344 kubelet[2469]: W0208 23:22:12.192339 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.192529 kubelet[2469]: E0208 23:22:12.192473 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.192836 kubelet[2469]: E0208 23:22:12.192817 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.192836 kubelet[2469]: W0208 23:22:12.192831 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.193030 kubelet[2469]: E0208 23:22:12.192937 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.193100 kubelet[2469]: E0208 23:22:12.193085 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.193100 kubelet[2469]: W0208 23:22:12.193096 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.193221 kubelet[2469]: E0208 23:22:12.193191 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.193360 kubelet[2469]: E0208 23:22:12.193342 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.193360 kubelet[2469]: W0208 23:22:12.193356 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.193556 kubelet[2469]: E0208 23:22:12.193379 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.193655 kubelet[2469]: E0208 23:22:12.193633 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.193655 kubelet[2469]: W0208 23:22:12.193650 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.193807 kubelet[2469]: E0208 23:22:12.193675 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.193920 kubelet[2469]: E0208 23:22:12.193900 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.193920 kubelet[2469]: W0208 23:22:12.193915 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.194064 kubelet[2469]: E0208 23:22:12.193938 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.194232 kubelet[2469]: E0208 23:22:12.194208 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.194330 kubelet[2469]: W0208 23:22:12.194308 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.194413 kubelet[2469]: E0208 23:22:12.194369 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.194917 kubelet[2469]: E0208 23:22:12.194895 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.194917 kubelet[2469]: W0208 23:22:12.194912 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.195100 kubelet[2469]: E0208 23:22:12.194938 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.195209 kubelet[2469]: E0208 23:22:12.195188 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.195209 kubelet[2469]: W0208 23:22:12.195204 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.195343 kubelet[2469]: E0208 23:22:12.195228 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.195601 kubelet[2469]: E0208 23:22:12.195581 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.195601 kubelet[2469]: W0208 23:22:12.195596 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.195749 kubelet[2469]: E0208 23:22:12.195621 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.196034 kubelet[2469]: E0208 23:22:12.196014 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.196034 kubelet[2469]: W0208 23:22:12.196028 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.196192 kubelet[2469]: E0208 23:22:12.196047 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:12.196334 kubelet[2469]: E0208 23:22:12.196316 2469 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:12.196424 kubelet[2469]: W0208 23:22:12.196400 2469 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:12.196511 kubelet[2469]: E0208 23:22:12.196425 2469 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:13.950202 kubelet[2469]: E0208 23:22:13.950126 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:15.949353 kubelet[2469]: E0208 23:22:15.949302 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:17.949553 kubelet[2469]: E0208 23:22:17.949499 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:19.948973 kubelet[2469]: E0208 23:22:19.948922 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:21.949908 kubelet[2469]: E0208 23:22:21.949854 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:23.949969 kubelet[2469]: E0208 23:22:23.949918 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:25.949708 kubelet[2469]: E0208 23:22:25.949627 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:27.949610 kubelet[2469]: E0208 23:22:27.949565 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:28.698000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:28.704344 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 8 23:22:28.704451 kernel: audit: type=1400 audit(1707434548.698:1141): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:28.698000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:28.738002 kernel: audit: type=1400 audit(1707434548.698:1142): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:28.738091 kernel: audit: type=1300 audit(1707434548.698:1141): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014e5380 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:28.698000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014e5380 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:28.763465 kernel: audit: type=1327 audit(1707434548.698:1141): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:28.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:28.698000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cfbfa0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:28.804255 kernel: audit: type=1300 audit(1707434548.698:1142): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cfbfa0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:28.804352 kernel: audit: type=1327 audit(1707434548.698:1142): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:28.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:29.607000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.607000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e2c54a0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.645867 kernel: audit: type=1400 audit(1707434549.607:1143): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.645974 kernel: audit: type=1300 audit(1707434549.607:1143): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e2c54a0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.645998 kernel: audit: type=1327 audit(1707434549.607:1143): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.645000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.680479 kernel: audit: type=1400 audit(1707434549.645:1144): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.645000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e67eff0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.645000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.645000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.645000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00fd0f880 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.645000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.655000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.655000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e67f0b0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.655000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.728000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.728000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00fffe480 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.728000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.760000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:29.760000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e2c55c0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:22:29.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:22:29.949760 kubelet[2469]: E0208 23:22:29.949630 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:31.949111 kubelet[2469]: E0208 23:22:31.949061 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:33.949294 kubelet[2469]: E0208 23:22:33.949244 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:35.949490 kubelet[2469]: E0208 23:22:35.949448 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:37.949811 kubelet[2469]: E0208 23:22:37.949537 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:39.949686 kubelet[2469]: E0208 23:22:39.949650 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:41.772166 env[1351]: time="2024-02-08T23:22:41.772118260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:41.778990 env[1351]: time="2024-02-08T23:22:41.778949097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:41.783563 env[1351]: time="2024-02-08T23:22:41.783425721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:41.789954 env[1351]: time="2024-02-08T23:22:41.789870555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:41.791557 env[1351]: time="2024-02-08T23:22:41.791524264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 8 23:22:41.794907 env[1351]: time="2024-02-08T23:22:41.794876382Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 8 23:22:41.832475 env[1351]: time="2024-02-08T23:22:41.832419783Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8\"" Feb 8 23:22:41.832993 env[1351]: time="2024-02-08T23:22:41.832955286Z" level=info msg="StartContainer for \"a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8\"" Feb 8 23:22:41.854959 systemd[1]: Started cri-containerd-a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8.scope. Feb 8 23:22:41.899239 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 8 23:22:41.899402 kernel: audit: type=1400 audit(1707434561.877:1149): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2906 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:41.919683 kernel: audit: type=1300 audit(1707434561.877:1149): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2906 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:41.919796 kernel: audit: type=1327 audit(1707434561.877:1149): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134643765643263313766663537633662303738383965663837646437 Feb 8 23:22:41.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134643765643263313766663537633662303738383965663837646437 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.954666 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.954760 kubelet[2469]: E0208 23:22:41.951851 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.974470 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.975990 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.977470 env[1351]: time="2024-02-08T23:22:41.977422459Z" level=info msg="StartContainer for \"a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8\" returns successfully" Feb 8 23:22:41.988840 systemd[1]: cri-containerd-a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8.scope: Deactivated successfully. Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.015923 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8-rootfs.mount: Deactivated successfully. Feb 8 23:22:42.017728 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.017830 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.031341 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.050758 kernel: audit: type=1400 audit(1707434561.877:1150): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.877000 audit: BPF prog-id=140 op=LOAD Feb 8 23:22:41.877000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0000efc70 items=0 ppid=2906 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:41.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134643765643263313766663537633662303738383965663837646437 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit: BPF prog-id=141 op=LOAD Feb 8 23:22:41.898000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0000efcb8 items=0 ppid=2906 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:41.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134643765643263313766663537633662303738383965663837646437 Feb 8 23:22:41.898000 audit: BPF prog-id=141 op=UNLOAD Feb 8 23:22:41.898000 audit: BPF prog-id=140 op=UNLOAD Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:41.898000 audit: BPF prog-id=142 op=LOAD Feb 8 23:22:41.898000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0000efd48 items=0 ppid=2906 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:41.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134643765643263313766663537633662303738383965663837646437 Feb 8 23:22:42.016000 audit: BPF prog-id=142 op=UNLOAD Feb 8 23:22:42.162509 env[1351]: time="2024-02-08T23:22:42.162400440Z" level=info msg="shim disconnected" id=a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8 Feb 8 23:22:42.162509 env[1351]: time="2024-02-08T23:22:42.162494941Z" level=warning msg="cleaning up after shim disconnected" id=a4d7ed2c17ff57c6b07889ef87dd7f4cf0827f5d9410e7c5f4358f079337d2c8 namespace=k8s.io Feb 8 23:22:42.162509 env[1351]: time="2024-02-08T23:22:42.162510941Z" level=info msg="cleaning up dead shim" Feb 8 23:22:42.171160 env[1351]: time="2024-02-08T23:22:42.171110886Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:22:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3136 runtime=io.containerd.runc.v2\n" Feb 8 23:22:43.131140 env[1351]: time="2024-02-08T23:22:43.131087064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 8 23:22:43.949918 kubelet[2469]: E0208 23:22:43.949840 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:45.317000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:45.317000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc10c0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:45.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:45.324000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:45.324000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:45.324000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001404980 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:45.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:45.324000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dc1200 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:45.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:45.325000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:22:45.325000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001404bc0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:22:45.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:22:45.949471 kubelet[2469]: E0208 23:22:45.949319 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:47.948996 kubelet[2469]: E0208 23:22:47.948948 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:49.949068 kubelet[2469]: E0208 23:22:49.949029 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:50.577190 env[1351]: time="2024-02-08T23:22:50.577136889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:50.585038 env[1351]: time="2024-02-08T23:22:50.584988828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:50.589617 env[1351]: time="2024-02-08T23:22:50.589578751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:50.593525 env[1351]: time="2024-02-08T23:22:50.593488470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:50.594232 env[1351]: time="2024-02-08T23:22:50.594198173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 8 23:22:50.606345 env[1351]: time="2024-02-08T23:22:50.606307533Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 8 23:22:50.637987 env[1351]: time="2024-02-08T23:22:50.637954988Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d\"" Feb 8 23:22:50.638581 env[1351]: time="2024-02-08T23:22:50.638554991Z" level=info msg="StartContainer for \"09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d\"" Feb 8 23:22:50.669138 systemd[1]: run-containerd-runc-k8s.io-09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d-runc.HyyL0M.mount: Deactivated successfully. Feb 8 23:22:50.671555 systemd[1]: Started cri-containerd-09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d.scope. Feb 8 23:22:50.707900 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 8 23:22:50.708054 kernel: audit: type=1400 audit(1707434570.685:1160): avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2906 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:50.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613238346363613338646131633965323434643735323235316535 Feb 8 23:22:50.746844 kernel: audit: type=1300 audit(1707434570.685:1160): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2906 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:50.746929 kernel: audit: type=1327 audit(1707434570.685:1160): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613238346363613338646131633965323434643735323235316535 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.778858 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.778964 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.791750 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.819718 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.819812 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.819886 env[1351]: time="2024-02-08T23:22:50.805518212Z" level=info msg="StartContainer for \"09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d\" returns successfully" Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.834706 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.685000 audit: BPF prog-id=143 op=LOAD Feb 8 23:22:50.685000 audit[3161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f2280 items=0 ppid=2906 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:50.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613238346363613338646131633965323434643735323235316535 Feb 8 23:22:50.848458 kernel: audit: type=1400 audit(1707434570.685:1161): avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit: BPF prog-id=144 op=LOAD Feb 8 23:22:50.707000 audit[3161]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f22c8 items=0 ppid=2906 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:50.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613238346363613338646131633965323434643735323235316535 Feb 8 23:22:50.707000 audit: BPF prog-id=144 op=UNLOAD Feb 8 23:22:50.707000 audit: BPF prog-id=143 op=UNLOAD Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { perfmon } for pid=3161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit[3161]: AVC avc: denied { bpf } for pid=3161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:50.707000 audit: BPF prog-id=145 op=LOAD Feb 8 23:22:50.707000 audit[3161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f2358 items=0 ppid=2906 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:50.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613238346363613338646131633965323434643735323235316535 Feb 8 23:22:51.949411 kubelet[2469]: E0208 23:22:51.949344 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:52.539815 systemd[1]: cri-containerd-09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d.scope: Deactivated successfully. Feb 8 23:22:52.543000 audit: BPF prog-id=145 op=UNLOAD Feb 8 23:22:52.560969 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d-rootfs.mount: Deactivated successfully. Feb 8 23:22:52.604212 kubelet[2469]: I0208 23:22:52.603178 2469 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.627152 2469 topology_manager.go:215] "Topology Admit Handler" podUID="d16009aa-04a4-4f60-89b0-c84594d97ec5" podNamespace="kube-system" podName="coredns-5dd5756b68-6d6s9" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.638856 2469 topology_manager.go:215] "Topology Admit Handler" podUID="9bca606b-cc36-49e9-ac06-22a6a4103dca" podNamespace="kube-system" podName="coredns-5dd5756b68-6k72j" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.640480 2469 topology_manager.go:215] "Topology Admit Handler" podUID="c1e49220-1f0b-4e2e-b993-a20b4c0606a0" podNamespace="calico-system" podName="calico-kube-controllers-6cc5c557f6-c4s7j" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793260 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d16009aa-04a4-4f60-89b0-c84594d97ec5-config-volume\") pod \"coredns-5dd5756b68-6d6s9\" (UID: \"d16009aa-04a4-4f60-89b0-c84594d97ec5\") " pod="kube-system/coredns-5dd5756b68-6d6s9" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793323 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5h4hl\" (UniqueName: \"kubernetes.io/projected/9bca606b-cc36-49e9-ac06-22a6a4103dca-kube-api-access-5h4hl\") pod \"coredns-5dd5756b68-6k72j\" (UID: \"9bca606b-cc36-49e9-ac06-22a6a4103dca\") " pod="kube-system/coredns-5dd5756b68-6k72j" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793411 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8l99w\" (UniqueName: \"kubernetes.io/projected/c1e49220-1f0b-4e2e-b993-a20b4c0606a0-kube-api-access-8l99w\") pod \"calico-kube-controllers-6cc5c557f6-c4s7j\" (UID: \"c1e49220-1f0b-4e2e-b993-a20b4c0606a0\") " pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793493 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c1e49220-1f0b-4e2e-b993-a20b4c0606a0-tigera-ca-bundle\") pod \"calico-kube-controllers-6cc5c557f6-c4s7j\" (UID: \"c1e49220-1f0b-4e2e-b993-a20b4c0606a0\") " pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793533 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxn95\" (UniqueName: \"kubernetes.io/projected/d16009aa-04a4-4f60-89b0-c84594d97ec5-kube-api-access-nxn95\") pod \"coredns-5dd5756b68-6d6s9\" (UID: \"d16009aa-04a4-4f60-89b0-c84594d97ec5\") " pod="kube-system/coredns-5dd5756b68-6d6s9" Feb 8 23:22:53.106321 kubelet[2469]: I0208 23:22:52.793631 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9bca606b-cc36-49e9-ac06-22a6a4103dca-config-volume\") pod \"coredns-5dd5756b68-6k72j\" (UID: \"9bca606b-cc36-49e9-ac06-22a6a4103dca\") " pod="kube-system/coredns-5dd5756b68-6k72j" Feb 8 23:22:52.633085 systemd[1]: Created slice kubepods-burstable-podd16009aa_04a4_4f60_89b0_c84594d97ec5.slice. Feb 8 23:22:52.645210 systemd[1]: Created slice kubepods-burstable-pod9bca606b_cc36_49e9_ac06_22a6a4103dca.slice. Feb 8 23:22:52.650974 systemd[1]: Created slice kubepods-besteffort-podc1e49220_1f0b_4e2e_b993_a20b4c0606a0.slice. Feb 8 23:22:53.409682 env[1351]: time="2024-02-08T23:22:53.409071536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6d6s9,Uid:d16009aa-04a4-4f60-89b0-c84594d97ec5,Namespace:kube-system,Attempt:0,}" Feb 8 23:22:53.410491 env[1351]: time="2024-02-08T23:22:53.410397742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cc5c557f6-c4s7j,Uid:c1e49220-1f0b-4e2e-b993-a20b4c0606a0,Namespace:calico-system,Attempt:0,}" Feb 8 23:22:53.410845 env[1351]: time="2024-02-08T23:22:53.410813444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6k72j,Uid:9bca606b-cc36-49e9-ac06-22a6a4103dca,Namespace:kube-system,Attempt:0,}" Feb 8 23:22:53.954907 systemd[1]: Created slice kubepods-besteffort-podfe14a064_ff0d_4c55_9eee_3d94032b7cf6.slice. Feb 8 23:22:53.959204 env[1351]: time="2024-02-08T23:22:53.959162273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qbksc,Uid:fe14a064-ff0d-4c55-9eee-3d94032b7cf6,Namespace:calico-system,Attempt:0,}" Feb 8 23:22:54.212010 env[1351]: time="2024-02-08T23:22:54.211684476Z" level=info msg="shim disconnected" id=09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d Feb 8 23:22:54.212010 env[1351]: time="2024-02-08T23:22:54.211739776Z" level=warning msg="cleaning up after shim disconnected" id=09a284cca38da1c9e244d752251e539aec74c79c80ae47e37c31b7eaf4d6a46d namespace=k8s.io Feb 8 23:22:54.212010 env[1351]: time="2024-02-08T23:22:54.211751076Z" level=info msg="cleaning up dead shim" Feb 8 23:22:54.220930 env[1351]: time="2024-02-08T23:22:54.220885320Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:22:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3220 runtime=io.containerd.runc.v2\n" Feb 8 23:22:54.501578 env[1351]: time="2024-02-08T23:22:54.501233653Z" level=error msg="Failed to destroy network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.502023 env[1351]: time="2024-02-08T23:22:54.501802556Z" level=error msg="encountered an error cleaning up failed sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.502023 env[1351]: time="2024-02-08T23:22:54.501879856Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cc5c557f6-c4s7j,Uid:c1e49220-1f0b-4e2e-b993-a20b4c0606a0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.502997 kubelet[2469]: E0208 23:22:54.502392 2469 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.502997 kubelet[2469]: E0208 23:22:54.502532 2469 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" Feb 8 23:22:54.502997 kubelet[2469]: E0208 23:22:54.502565 2469 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" Feb 8 23:22:54.502997 kubelet[2469]: E0208 23:22:54.502948 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6cc5c557f6-c4s7j_calico-system(c1e49220-1f0b-4e2e-b993-a20b4c0606a0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6cc5c557f6-c4s7j_calico-system(c1e49220-1f0b-4e2e-b993-a20b4c0606a0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" podUID="c1e49220-1f0b-4e2e-b993-a20b4c0606a0" Feb 8 23:22:54.541467 env[1351]: time="2024-02-08T23:22:54.541381144Z" level=error msg="Failed to destroy network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.541996 env[1351]: time="2024-02-08T23:22:54.541947447Z" level=error msg="encountered an error cleaning up failed sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.542125 env[1351]: time="2024-02-08T23:22:54.542027147Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6d6s9,Uid:d16009aa-04a4-4f60-89b0-c84594d97ec5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.542629 kubelet[2469]: E0208 23:22:54.542344 2469 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.542629 kubelet[2469]: E0208 23:22:54.542424 2469 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6d6s9" Feb 8 23:22:54.542629 kubelet[2469]: E0208 23:22:54.542487 2469 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6d6s9" Feb 8 23:22:54.542629 kubelet[2469]: E0208 23:22:54.542579 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-6d6s9_kube-system(d16009aa-04a4-4f60-89b0-c84594d97ec5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-6d6s9_kube-system(d16009aa-04a4-4f60-89b0-c84594d97ec5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6d6s9" podUID="d16009aa-04a4-4f60-89b0-c84594d97ec5" Feb 8 23:22:54.547678 env[1351]: time="2024-02-08T23:22:54.547630674Z" level=error msg="Failed to destroy network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.548214 env[1351]: time="2024-02-08T23:22:54.548142776Z" level=error msg="encountered an error cleaning up failed sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.548460 env[1351]: time="2024-02-08T23:22:54.548393878Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6k72j,Uid:9bca606b-cc36-49e9-ac06-22a6a4103dca,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.549038 kubelet[2469]: E0208 23:22:54.548813 2469 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.549038 kubelet[2469]: E0208 23:22:54.548878 2469 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6k72j" Feb 8 23:22:54.549038 kubelet[2469]: E0208 23:22:54.548922 2469 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6k72j" Feb 8 23:22:54.549038 kubelet[2469]: E0208 23:22:54.549006 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-6k72j_kube-system(9bca606b-cc36-49e9-ac06-22a6a4103dca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-6k72j_kube-system(9bca606b-cc36-49e9-ac06-22a6a4103dca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6k72j" podUID="9bca606b-cc36-49e9-ac06-22a6a4103dca" Feb 8 23:22:54.556076 env[1351]: time="2024-02-08T23:22:54.556030214Z" level=error msg="Failed to destroy network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.556377 env[1351]: time="2024-02-08T23:22:54.556344415Z" level=error msg="encountered an error cleaning up failed sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.556487 env[1351]: time="2024-02-08T23:22:54.556403616Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qbksc,Uid:fe14a064-ff0d-4c55-9eee-3d94032b7cf6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.556647 kubelet[2469]: E0208 23:22:54.556629 2469 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:54.556750 kubelet[2469]: E0208 23:22:54.556699 2469 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:54.556750 kubelet[2469]: E0208 23:22:54.556729 2469 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qbksc" Feb 8 23:22:54.556857 kubelet[2469]: E0208 23:22:54.556786 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qbksc_calico-system(fe14a064-ff0d-4c55-9eee-3d94032b7cf6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qbksc_calico-system(fe14a064-ff0d-4c55-9eee-3d94032b7cf6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:55.154891 kubelet[2469]: I0208 23:22:55.154851 2469 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:22:55.156134 env[1351]: time="2024-02-08T23:22:55.155902462Z" level=info msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" Feb 8 23:22:55.157918 kubelet[2469]: I0208 23:22:55.157220 2469 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:22:55.158324 env[1351]: time="2024-02-08T23:22:55.158286773Z" level=info msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" Feb 8 23:22:55.161823 kubelet[2469]: I0208 23:22:55.161252 2469 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:22:55.162157 env[1351]: time="2024-02-08T23:22:55.162126291Z" level=info msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" Feb 8 23:22:55.173451 env[1351]: time="2024-02-08T23:22:55.171257734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 8 23:22:55.173451 env[1351]: time="2024-02-08T23:22:55.173064543Z" level=info msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" Feb 8 23:22:55.173585 kubelet[2469]: I0208 23:22:55.172227 2469 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:22:55.247959 env[1351]: time="2024-02-08T23:22:55.247882196Z" level=error msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" failed" error="failed to destroy network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:55.248362 kubelet[2469]: E0208 23:22:55.248332 2469 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:22:55.248511 kubelet[2469]: E0208 23:22:55.248494 2469 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d"} Feb 8 23:22:55.248579 kubelet[2469]: E0208 23:22:55.248566 2469 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:22:55.248677 kubelet[2469]: E0208 23:22:55.248625 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe14a064-ff0d-4c55-9eee-3d94032b7cf6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qbksc" podUID="fe14a064-ff0d-4c55-9eee-3d94032b7cf6" Feb 8 23:22:55.255450 env[1351]: time="2024-02-08T23:22:55.255369331Z" level=error msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" failed" error="failed to destroy network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:55.255675 kubelet[2469]: E0208 23:22:55.255642 2469 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:22:55.255770 kubelet[2469]: E0208 23:22:55.255686 2469 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79"} Feb 8 23:22:55.255770 kubelet[2469]: E0208 23:22:55.255736 2469 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9bca606b-cc36-49e9-ac06-22a6a4103dca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:22:55.255902 kubelet[2469]: E0208 23:22:55.255777 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9bca606b-cc36-49e9-ac06-22a6a4103dca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6k72j" podUID="9bca606b-cc36-49e9-ac06-22a6a4103dca" Feb 8 23:22:55.258310 env[1351]: time="2024-02-08T23:22:55.258240545Z" level=error msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" failed" error="failed to destroy network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:55.258741 kubelet[2469]: E0208 23:22:55.258718 2469 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:22:55.258840 kubelet[2469]: E0208 23:22:55.258754 2469 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c"} Feb 8 23:22:55.258840 kubelet[2469]: E0208 23:22:55.258799 2469 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d16009aa-04a4-4f60-89b0-c84594d97ec5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:22:55.258840 kubelet[2469]: E0208 23:22:55.258836 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d16009aa-04a4-4f60-89b0-c84594d97ec5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6d6s9" podUID="d16009aa-04a4-4f60-89b0-c84594d97ec5" Feb 8 23:22:55.271032 env[1351]: time="2024-02-08T23:22:55.270991505Z" level=error msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" failed" error="failed to destroy network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:22:55.271222 kubelet[2469]: E0208 23:22:55.271200 2469 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:22:55.271319 kubelet[2469]: E0208 23:22:55.271235 2469 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666"} Feb 8 23:22:55.271319 kubelet[2469]: E0208 23:22:55.271275 2469 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1e49220-1f0b-4e2e-b993-a20b4c0606a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:22:55.271319 kubelet[2469]: E0208 23:22:55.271307 2469 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1e49220-1f0b-4e2e-b993-a20b4c0606a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" podUID="c1e49220-1f0b-4e2e-b993-a20b4c0606a0" Feb 8 23:22:55.346282 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d-shm.mount: Deactivated successfully. Feb 8 23:22:55.346412 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79-shm.mount: Deactivated successfully. Feb 8 23:22:55.346511 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666-shm.mount: Deactivated successfully. Feb 8 23:22:55.346586 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c-shm.mount: Deactivated successfully. Feb 8 23:23:03.431608 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount182487104.mount: Deactivated successfully. Feb 8 23:23:03.539846 env[1351]: time="2024-02-08T23:23:03.539786075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:03.546675 env[1351]: time="2024-02-08T23:23:03.546638306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:03.549991 env[1351]: time="2024-02-08T23:23:03.549963021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:03.552942 env[1351]: time="2024-02-08T23:23:03.552914934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:03.553307 env[1351]: time="2024-02-08T23:23:03.553278536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 8 23:23:03.571144 env[1351]: time="2024-02-08T23:23:03.571110415Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 8 23:23:03.610426 env[1351]: time="2024-02-08T23:23:03.610318490Z" level=info msg="CreateContainer within sandbox \"7d087a14c0e704e2d20f102c8e1e78e1541bff220ff4f5b34261f36bfdb1e818\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6\"" Feb 8 23:23:03.610912 env[1351]: time="2024-02-08T23:23:03.610883593Z" level=info msg="StartContainer for \"8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6\"" Feb 8 23:23:03.630610 systemd[1]: Started cri-containerd-8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6.scope. Feb 8 23:23:03.669669 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 8 23:23:03.669800 kernel: audit: type=1400 audit(1707434583.649:1167): avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689907 kernel: audit: type=1300 audit(1707434583.649:1167): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2906 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:03.649000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2906 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:03.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353433313332623064636161613034663135653565373235623262 Feb 8 23:23:03.708481 kernel: audit: type=1327 audit(1707434583.649:1167): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353433313332623064636161613034663135653565373235623262 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.722457 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.722507 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.744977 env[1351]: time="2024-02-08T23:23:03.744934992Z" level=info msg="StartContainer for \"8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6\" returns successfully" Feb 8 23:23:03.749859 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.779700 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.779787 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.794042 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.808467 kernel: audit: type=1400 audit(1707434583.649:1168): avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.649000 audit: BPF prog-id=146 op=LOAD Feb 8 23:23:03.649000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00021a980 items=0 ppid=2906 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:03.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353433313332623064636161613034663135653565373235623262 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.668000 audit: BPF prog-id=147 op=LOAD Feb 8 23:23:03.668000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00021a9c8 items=0 ppid=2906 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:03.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353433313332623064636161613034663135653565373235623262 Feb 8 23:23:03.689000 audit: BPF prog-id=147 op=UNLOAD Feb 8 23:23:03.689000 audit: BPF prog-id=146 op=UNLOAD Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:03.689000 audit: BPF prog-id=148 op=LOAD Feb 8 23:23:03.689000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00021aa58 items=0 ppid=2906 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:03.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863353433313332623064636161613034663135653565373235623262 Feb 8 23:23:04.070121 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 8 23:23:04.070310 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 8 23:23:05.165803 systemd[1]: run-containerd-runc-k8s.io-8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6-runc.hhDUQq.mount: Deactivated successfully. Feb 8 23:23:05.554000 audit[3604]: AVC avc: denied { write } for pid=3604 comm="tee" name="fd" dev="proc" ino=33743 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.554000 audit[3604]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa366e962 a2=241 a3=1b6 items=1 ppid=3583 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.554000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 8 23:23:05.554000 audit: PATH item=0 name="/dev/fd/63" inode=33731 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.554000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.561000 audit[3606]: AVC avc: denied { write } for pid=3606 comm="tee" name="fd" dev="proc" ino=33749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.561000 audit[3606]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf5176961 a2=241 a3=1b6 items=1 ppid=3585 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.561000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 8 23:23:05.561000 audit: PATH item=0 name="/dev/fd/63" inode=32729 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.561000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.566000 audit[3614]: AVC avc: denied { write } for pid=3614 comm="tee" name="fd" dev="proc" ino=33758 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.566000 audit[3614]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd42b02973 a2=241 a3=1b6 items=1 ppid=3576 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.581000 audit[3631]: AVC avc: denied { write } for pid=3631 comm="tee" name="fd" dev="proc" ino=33776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.581000 audit[3631]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe319fd971 a2=241 a3=1b6 items=1 ppid=3590 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.566000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 8 23:23:05.566000 audit: PATH item=0 name="/dev/fd/63" inode=33740 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.566000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.604000 audit[3636]: AVC avc: denied { write } for pid=3636 comm="tee" name="fd" dev="proc" ino=33783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.604000 audit[3628]: AVC avc: denied { write } for pid=3628 comm="tee" name="fd" dev="proc" ino=33785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.604000 audit[3628]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc575e7971 a2=241 a3=1b6 items=1 ppid=3580 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.581000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 8 23:23:05.581000 audit: PATH item=0 name="/dev/fd/63" inode=33755 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.604000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 8 23:23:05.604000 audit: PATH item=0 name="/dev/fd/63" inode=32732 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.604000 audit[3636]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff59b71972 a2=241 a3=1b6 items=1 ppid=3582 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.604000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 8 23:23:05.604000 audit: PATH item=0 name="/dev/fd/63" inode=32733 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:05.634000 audit[3651]: AVC avc: denied { write } for pid=3651 comm="tee" name="fd" dev="proc" ino=33792 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:05.634000 audit[3651]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd96cc971 a2=241 a3=1b6 items=1 ppid=3587 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:05.634000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 8 23:23:05.634000 audit: PATH item=0 name="/dev/fd/63" inode=33787 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:05.634000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit: BPF prog-id=149 op=LOAD Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda27ed110 a2=70 a3=7fea19297000 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit: BPF prog-id=149 op=UNLOAD Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit: BPF prog-id=150 op=LOAD Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffda27ed110 a2=70 a3=6e items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit: BPF prog-id=150 op=UNLOAD Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffda27ed0c0 a2=70 a3=7ffda27ed110 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit: BPF prog-id=151 op=LOAD Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffda27ed0a0 a2=70 a3=7ffda27ed110 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit: BPF prog-id=151 op=UNLOAD Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda27ed180 a2=70 a3=0 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffda27ed170 a2=70 a3=0 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.175000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.175000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffda27ed1b0 a2=70 a3=0 items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.180000 audit: BPF prog-id=152 op=LOAD Feb 8 23:23:06.180000 audit[3715]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffda27ed0d0 a2=70 a3=ffffffff items=0 ppid=3588 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.180000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:06.187000 audit[3719]: AVC avc: denied { bpf } for pid=3719 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.187000 audit[3719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd83fe5fc0 a2=70 a3=fff80800 items=0 ppid=3588 pid=3719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:23:06.187000 audit[3719]: AVC avc: denied { bpf } for pid=3719 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:06.187000 audit[3719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd83fe5e90 a2=70 a3=3 items=0 ppid=3588 pid=3719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:23:06.193000 audit: BPF prog-id=152 op=UNLOAD Feb 8 23:23:06.308000 audit[3741]: NETFILTER_CFG table=nat:101 family=2 entries=16 op=nft_register_chain pid=3741 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:06.308000 audit[3742]: NETFILTER_CFG table=mangle:102 family=2 entries=19 op=nft_register_chain pid=3742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:06.308000 audit[3742]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd92d8f830 a2=0 a3=55bc8097d000 items=0 ppid=3588 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:06.308000 audit[3741]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffdf45f7110 a2=0 a3=7ffdf45f70fc items=0 ppid=3588 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:06.311000 audit[3743]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3743 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:06.311000 audit[3743]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffead787780 a2=0 a3=5601a1825000 items=0 ppid=3588 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.311000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:06.322000 audit[3740]: NETFILTER_CFG table=raw:104 family=2 entries=19 op=nft_register_chain pid=3740 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:06.322000 audit[3740]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdb30455f0 a2=0 a3=55cebbc39000 items=0 ppid=3588 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:06.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:06.949691 systemd-networkd[1493]: vxlan.calico: Link UP Feb 8 23:23:06.949701 systemd-networkd[1493]: vxlan.calico: Gained carrier Feb 8 23:23:07.951379 env[1351]: time="2024-02-08T23:23:07.950791623Z" level=info msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" Feb 8 23:23:07.951379 env[1351]: time="2024-02-08T23:23:07.950791723Z" level=info msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" Feb 8 23:23:08.022580 kubelet[2469]: I0208 23:23:08.022532 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-j45fk" podStartSLOduration=5.705755423 podCreationTimestamp="2024-02-08 23:22:04 +0000 UTC" firstStartedPulling="2024-02-08 23:22:05.236908125 +0000 UTC m=+32.479437896" lastFinishedPulling="2024-02-08 23:23:03.553613537 +0000 UTC m=+90.796143308" observedRunningTime="2024-02-08 23:23:04.217688498 +0000 UTC m=+91.460218369" watchObservedRunningTime="2024-02-08 23:23:08.022460835 +0000 UTC m=+95.264990606" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.024 [INFO][3792] k8s.go 578: Cleaning up netns ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.024 [INFO][3792] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" iface="eth0" netns="/var/run/netns/cni-3fbe17f9-2952-530d-29cf-95b2cfff12f6" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.024 [INFO][3792] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" iface="eth0" netns="/var/run/netns/cni-3fbe17f9-2952-530d-29cf-95b2cfff12f6" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.025 [INFO][3792] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" iface="eth0" netns="/var/run/netns/cni-3fbe17f9-2952-530d-29cf-95b2cfff12f6" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.025 [INFO][3792] k8s.go 585: Releasing IP address(es) ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.025 [INFO][3792] utils.go 188: Calico CNI releasing IP address ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.069 [INFO][3800] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.070 [INFO][3800] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.070 [INFO][3800] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.080 [WARNING][3800] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.080 [INFO][3800] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.083 [INFO][3800] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:08.085326 env[1351]: 2024-02-08 23:23:08.084 [INFO][3792] k8s.go 591: Teardown processing complete. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:08.088443 systemd[1]: run-netns-cni\x2d3fbe17f9\x2d2952\x2d530d\x2d29cf\x2d95b2cfff12f6.mount: Deactivated successfully. Feb 8 23:23:08.089689 env[1351]: time="2024-02-08T23:23:08.089635126Z" level=info msg="TearDown network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" successfully" Feb 8 23:23:08.089844 env[1351]: time="2024-02-08T23:23:08.089822627Z" level=info msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" returns successfully" Feb 8 23:23:08.090985 env[1351]: time="2024-02-08T23:23:08.090949732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6k72j,Uid:9bca606b-cc36-49e9-ac06-22a6a4103dca,Namespace:kube-system,Attempt:1,}" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.020 [INFO][3783] k8s.go 578: Cleaning up netns ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.020 [INFO][3783] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" iface="eth0" netns="/var/run/netns/cni-78d11088-8a13-caaf-d2c0-f85b6eb2d943" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.021 [INFO][3783] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" iface="eth0" netns="/var/run/netns/cni-78d11088-8a13-caaf-d2c0-f85b6eb2d943" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.021 [INFO][3783] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" iface="eth0" netns="/var/run/netns/cni-78d11088-8a13-caaf-d2c0-f85b6eb2d943" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.021 [INFO][3783] k8s.go 585: Releasing IP address(es) ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.021 [INFO][3783] utils.go 188: Calico CNI releasing IP address ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.111 [INFO][3799] ipam_plugin.go 415: Releasing address using handleID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.113 [INFO][3799] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.113 [INFO][3799] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.123 [WARNING][3799] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.123 [INFO][3799] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.125 [INFO][3799] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:08.129091 env[1351]: 2024-02-08 23:23:08.127 [INFO][3783] k8s.go 591: Teardown processing complete. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:08.132149 systemd[1]: run-netns-cni\x2d78d11088\x2d8a13\x2dcaaf\x2dd2c0\x2df85b6eb2d943.mount: Deactivated successfully. Feb 8 23:23:08.133293 env[1351]: time="2024-02-08T23:23:08.133236515Z" level=info msg="TearDown network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" successfully" Feb 8 23:23:08.133293 env[1351]: time="2024-02-08T23:23:08.133289716Z" level=info msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" returns successfully" Feb 8 23:23:08.134092 env[1351]: time="2024-02-08T23:23:08.134062119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qbksc,Uid:fe14a064-ff0d-4c55-9eee-3d94032b7cf6,Namespace:calico-system,Attempt:1,}" Feb 8 23:23:08.293699 systemd-networkd[1493]: vxlan.calico: Gained IPv6LL Feb 8 23:23:08.331587 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:08.331764 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibbffad55287: link becomes ready Feb 8 23:23:08.333899 systemd-networkd[1493]: calibbffad55287: Link UP Feb 8 23:23:08.334129 systemd-networkd[1493]: calibbffad55287: Gained carrier Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.217 [INFO][3812] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0 coredns-5dd5756b68- kube-system 9bca606b-cc36-49e9-ac06-22a6a4103dca 812 0 2024-02-08 23:21:46 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 coredns-5dd5756b68-6k72j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibbffad55287 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.217 [INFO][3812] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.272 [INFO][3832] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" HandleID="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.283 [INFO][3832] ipam_plugin.go 268: Auto assigning IP ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" HandleID="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"coredns-5dd5756b68-6k72j", "timestamp":"2024-02-08 23:23:08.272009618 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.283 [INFO][3832] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.284 [INFO][3832] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.284 [INFO][3832] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.285 [INFO][3832] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.293 [INFO][3832] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.298 [INFO][3832] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.300 [INFO][3832] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.303 [INFO][3832] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.303 [INFO][3832] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.307 [INFO][3832] ipam.go 1682: Creating new handle: k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.311 [INFO][3832] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.317 [INFO][3832] ipam.go 1216: Successfully claimed IPs: [192.168.13.129/26] block=192.168.13.128/26 handle="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.317 [INFO][3832] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.129/26] handle="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.317 [INFO][3832] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:08.346464 env[1351]: 2024-02-08 23:23:08.317 [INFO][3832] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.129/26] IPv6=[] ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" HandleID="k8s-pod-network.19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.318 [INFO][3812] k8s.go 385: Populated endpoint ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9bca606b-cc36-49e9-ac06-22a6a4103dca", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"coredns-5dd5756b68-6k72j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibbffad55287", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.318 [INFO][3812] k8s.go 386: Calico CNI using IPs: [192.168.13.129/32] ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.318 [INFO][3812] dataplane_linux.go 68: Setting the host side veth name to calibbffad55287 ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.333 [INFO][3812] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.333 [INFO][3812] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9bca606b-cc36-49e9-ac06-22a6a4103dca", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed", Pod:"coredns-5dd5756b68-6k72j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibbffad55287", MAC:"fe:05:83:bf:74:e0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:08.347281 env[1351]: 2024-02-08 23:23:08.345 [INFO][3812] k8s.go 491: Wrote updated endpoint to datastore ContainerID="19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed" Namespace="kube-system" Pod="coredns-5dd5756b68-6k72j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:08.369465 env[1351]: time="2024-02-08T23:23:08.369218439Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:08.369465 env[1351]: time="2024-02-08T23:23:08.369270040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:08.369465 env[1351]: time="2024-02-08T23:23:08.369288040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:08.369861 env[1351]: time="2024-02-08T23:23:08.369827442Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed pid=3863 runtime=io.containerd.runc.v2 Feb 8 23:23:08.393235 systemd-networkd[1493]: cali5a80d4c3fb4: Link UP Feb 8 23:23:08.402507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a80d4c3fb4: link becomes ready Feb 8 23:23:08.402685 systemd-networkd[1493]: cali5a80d4c3fb4: Gained carrier Feb 8 23:23:08.421299 systemd[1]: Started cri-containerd-19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed.scope. Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.258 [INFO][3821] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0 csi-node-driver- calico-system fe14a064-ff0d-4c55-9eee-3d94032b7cf6 811 0 2024-02-08 23:22:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 csi-node-driver-qbksc eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5a80d4c3fb4 [] []}} ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.258 [INFO][3821] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.302 [INFO][3838] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" HandleID="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.314 [INFO][3838] ipam_plugin.go 268: Auto assigning IP ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" HandleID="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000501530), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"csi-node-driver-qbksc", "timestamp":"2024-02-08 23:23:08.302304249 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.314 [INFO][3838] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.318 [INFO][3838] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.318 [INFO][3838] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.338 [INFO][3838] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.343 [INFO][3838] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.351 [INFO][3838] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.354 [INFO][3838] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.359 [INFO][3838] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.359 [INFO][3838] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.362 [INFO][3838] ipam.go 1682: Creating new handle: k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.372 [INFO][3838] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.380 [INFO][3838] ipam.go 1216: Successfully claimed IPs: [192.168.13.130/26] block=192.168.13.128/26 handle="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.380 [INFO][3838] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.130/26] handle="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.380 [INFO][3838] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:08.431707 env[1351]: 2024-02-08 23:23:08.380 [INFO][3838] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.130/26] IPv6=[] ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" HandleID="k8s-pod-network.48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.382 [INFO][3821] k8s.go 385: Populated endpoint ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe14a064-ff0d-4c55-9eee-3d94032b7cf6", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"csi-node-driver-qbksc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5a80d4c3fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.382 [INFO][3821] k8s.go 386: Calico CNI using IPs: [192.168.13.130/32] ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.382 [INFO][3821] dataplane_linux.go 68: Setting the host side veth name to cali5a80d4c3fb4 ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.403 [INFO][3821] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.403 [INFO][3821] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe14a064-ff0d-4c55-9eee-3d94032b7cf6", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec", Pod:"csi-node-driver-qbksc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5a80d4c3fb4", MAC:"f6:b8:f2:36:2c:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:08.432696 env[1351]: 2024-02-08 23:23:08.417 [INFO][3821] k8s.go 491: Wrote updated endpoint to datastore ContainerID="48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec" Namespace="calico-system" Pod="csi-node-driver-qbksc" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.438000 audit: BPF prog-id=153 op=LOAD Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3863 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303534383933636232633631343130383938663735343630613038 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3863 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303534383933636232633631343130383938663735343630613038 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.440000 audit: BPF prog-id=154 op=LOAD Feb 8 23:23:08.440000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022a970 items=0 ppid=3863 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303534383933636232633631343130383938663735343630613038 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit: BPF prog-id=155 op=LOAD Feb 8 23:23:08.441000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022a9b8 items=0 ppid=3863 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303534383933636232633631343130383938663735343630613038 Feb 8 23:23:08.441000 audit: BPF prog-id=155 op=UNLOAD Feb 8 23:23:08.441000 audit: BPF prog-id=154 op=UNLOAD Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.441000 audit: BPF prog-id=156 op=LOAD Feb 8 23:23:08.441000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022adc8 items=0 ppid=3863 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303534383933636232633631343130383938663735343630613038 Feb 8 23:23:08.444000 audit[3886]: NETFILTER_CFG table=filter:105 family=2 entries=36 op=nft_register_chain pid=3886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:08.444000 audit[3886]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd0ffb26b0 a2=0 a3=7ffd0ffb269c items=0 ppid=3588 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.444000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:08.460913 env[1351]: time="2024-02-08T23:23:08.460832837Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:08.461037 env[1351]: time="2024-02-08T23:23:08.460892937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:08.461037 env[1351]: time="2024-02-08T23:23:08.460907437Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:08.461164 env[1351]: time="2024-02-08T23:23:08.461130338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec pid=3911 runtime=io.containerd.runc.v2 Feb 8 23:23:08.482580 systemd[1]: Started cri-containerd-48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec.scope. Feb 8 23:23:08.514556 env[1351]: time="2024-02-08T23:23:08.514505870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6k72j,Uid:9bca606b-cc36-49e9-ac06-22a6a4103dca,Namespace:kube-system,Attempt:1,} returns sandbox id \"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed\"" Feb 8 23:23:08.518196 env[1351]: time="2024-02-08T23:23:08.518156186Z" level=info msg="CreateContainer within sandbox \"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 8 23:23:08.530000 audit[3953]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:08.530000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffcd792a980 a2=0 a3=7ffcd792a96c items=0 ppid=3588 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.530000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.534000 audit: BPF prog-id=157 op=LOAD Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3911 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656430343630396530313965363666636165306137656439653530 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3911 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656430343630396530313965363666636165306137656439653530 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit: BPF prog-id=158 op=LOAD Feb 8 23:23:08.535000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000283520 items=0 ppid=3911 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656430343630396530313965363666636165306137656439653530 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit: BPF prog-id=159 op=LOAD Feb 8 23:23:08.535000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000283568 items=0 ppid=3911 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656430343630396530313965363666636165306137656439653530 Feb 8 23:23:08.535000 audit: BPF prog-id=159 op=UNLOAD Feb 8 23:23:08.535000 audit: BPF prog-id=158 op=UNLOAD Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.535000 audit: BPF prog-id=160 op=LOAD Feb 8 23:23:08.535000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000283978 items=0 ppid=3911 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656430343630396530313965363666636165306137656439653530 Feb 8 23:23:08.559520 env[1351]: time="2024-02-08T23:23:08.559379065Z" level=info msg="CreateContainer within sandbox \"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"feb8cd10e711bfbf803192fdfd597ce5f03c02892c3de2ceb69f73dac8de9212\"" Feb 8 23:23:08.560527 env[1351]: time="2024-02-08T23:23:08.560493569Z" level=info msg="StartContainer for \"feb8cd10e711bfbf803192fdfd597ce5f03c02892c3de2ceb69f73dac8de9212\"" Feb 8 23:23:08.573244 env[1351]: time="2024-02-08T23:23:08.573211425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qbksc,Uid:fe14a064-ff0d-4c55-9eee-3d94032b7cf6,Namespace:calico-system,Attempt:1,} returns sandbox id \"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec\"" Feb 8 23:23:08.575194 env[1351]: time="2024-02-08T23:23:08.575169533Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 8 23:23:08.590658 systemd[1]: Started cri-containerd-feb8cd10e711bfbf803192fdfd597ce5f03c02892c3de2ceb69f73dac8de9212.scope. Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.614000 audit: BPF prog-id=161 op=LOAD Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3863 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623863643130653731316266626638303331393266646664353937 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3863 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623863643130653731316266626638303331393266646664353937 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit: BPF prog-id=162 op=LOAD Feb 8 23:23:08.615000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003808a0 items=0 ppid=3863 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623863643130653731316266626638303331393266646664353937 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit: BPF prog-id=163 op=LOAD Feb 8 23:23:08.615000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003808e8 items=0 ppid=3863 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623863643130653731316266626638303331393266646664353937 Feb 8 23:23:08.615000 audit: BPF prog-id=163 op=UNLOAD Feb 8 23:23:08.615000 audit: BPF prog-id=162 op=UNLOAD Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:08.615000 audit: BPF prog-id=164 op=LOAD Feb 8 23:23:08.615000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000380cf8 items=0 ppid=3863 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:08.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665623863643130653731316266626638303331393266646664353937 Feb 8 23:23:08.638958 env[1351]: time="2024-02-08T23:23:08.638907010Z" level=info msg="StartContainer for \"feb8cd10e711bfbf803192fdfd597ce5f03c02892c3de2ceb69f73dac8de9212\" returns successfully" Feb 8 23:23:08.954018 env[1351]: time="2024-02-08T23:23:08.952031968Z" level=info msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.006 [INFO][4008] k8s.go 578: Cleaning up netns ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.006 [INFO][4008] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" iface="eth0" netns="/var/run/netns/cni-3247b5aa-20e6-da19-3c2a-b9dbf1fc244f" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.006 [INFO][4008] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" iface="eth0" netns="/var/run/netns/cni-3247b5aa-20e6-da19-3c2a-b9dbf1fc244f" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.006 [INFO][4008] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" iface="eth0" netns="/var/run/netns/cni-3247b5aa-20e6-da19-3c2a-b9dbf1fc244f" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.007 [INFO][4008] k8s.go 585: Releasing IP address(es) ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.007 [INFO][4008] utils.go 188: Calico CNI releasing IP address ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.029 [INFO][4014] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.029 [INFO][4014] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.029 [INFO][4014] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.038 [WARNING][4014] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.038 [INFO][4014] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.040 [INFO][4014] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:09.042130 env[1351]: 2024-02-08 23:23:09.041 [INFO][4008] k8s.go 591: Teardown processing complete. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:09.042805 env[1351]: time="2024-02-08T23:23:09.042297459Z" level=info msg="TearDown network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" successfully" Feb 8 23:23:09.042805 env[1351]: time="2024-02-08T23:23:09.042353759Z" level=info msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" returns successfully" Feb 8 23:23:09.043165 env[1351]: time="2024-02-08T23:23:09.043128163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cc5c557f6-c4s7j,Uid:c1e49220-1f0b-4e2e-b993-a20b4c0606a0,Namespace:calico-system,Attempt:1,}" Feb 8 23:23:09.094560 systemd[1]: run-netns-cni\x2d3247b5aa\x2d20e6\x2dda19\x2d3c2a\x2db9dbf1fc244f.mount: Deactivated successfully. Feb 8 23:23:09.181417 systemd-networkd[1493]: cali4883e41e1d4: Link UP Feb 8 23:23:09.189869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4883e41e1d4: link becomes ready Feb 8 23:23:09.191070 systemd-networkd[1493]: cali4883e41e1d4: Gained carrier Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.119 [INFO][4022] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0 calico-kube-controllers-6cc5c557f6- calico-system c1e49220-1f0b-4e2e-b993-a20b4c0606a0 825 0 2024-02-08 23:22:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6cc5c557f6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 calico-kube-controllers-6cc5c557f6-c4s7j eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4883e41e1d4 [] []}} ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.120 [INFO][4022] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.144 [INFO][4033] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" HandleID="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.153 [INFO][4033] ipam_plugin.go 268: Auto assigning IP ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" HandleID="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d7b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"calico-kube-controllers-6cc5c557f6-c4s7j", "timestamp":"2024-02-08 23:23:09.144307699 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.153 [INFO][4033] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.153 [INFO][4033] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.153 [INFO][4033] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.154 [INFO][4033] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.158 [INFO][4033] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.161 [INFO][4033] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.162 [INFO][4033] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.164 [INFO][4033] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.165 [INFO][4033] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.166 [INFO][4033] ipam.go 1682: Creating new handle: k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.171 [INFO][4033] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.176 [INFO][4033] ipam.go 1216: Successfully claimed IPs: [192.168.13.131/26] block=192.168.13.128/26 handle="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.176 [INFO][4033] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.131/26] handle="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.176 [INFO][4033] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:09.216242 env[1351]: 2024-02-08 23:23:09.176 [INFO][4033] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.131/26] IPv6=[] ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" HandleID="k8s-pod-network.130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.177 [INFO][4022] k8s.go 385: Populated endpoint ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0", GenerateName:"calico-kube-controllers-6cc5c557f6-", Namespace:"calico-system", SelfLink:"", UID:"c1e49220-1f0b-4e2e-b993-a20b4c0606a0", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cc5c557f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"calico-kube-controllers-6cc5c557f6-c4s7j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4883e41e1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.177 [INFO][4022] k8s.go 386: Calico CNI using IPs: [192.168.13.131/32] ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.177 [INFO][4022] dataplane_linux.go 68: Setting the host side veth name to cali4883e41e1d4 ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.190 [INFO][4022] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.192 [INFO][4022] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0", GenerateName:"calico-kube-controllers-6cc5c557f6-", Namespace:"calico-system", SelfLink:"", UID:"c1e49220-1f0b-4e2e-b993-a20b4c0606a0", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cc5c557f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b", Pod:"calico-kube-controllers-6cc5c557f6-c4s7j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4883e41e1d4", MAC:"6e:e0:b7:5c:4f:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:09.217338 env[1351]: 2024-02-08 23:23:09.203 [INFO][4022] k8s.go 491: Wrote updated endpoint to datastore ContainerID="130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b" Namespace="calico-system" Pod="calico-kube-controllers-6cc5c557f6-c4s7j" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:09.229466 kubelet[2469]: I0208 23:23:09.229403 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-6k72j" podStartSLOduration=83.229359467 podCreationTimestamp="2024-02-08 23:21:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:23:09.228840364 +0000 UTC m=+96.471370235" watchObservedRunningTime="2024-02-08 23:23:09.229359467 +0000 UTC m=+96.471889238" Feb 8 23:23:09.258616 env[1351]: time="2024-02-08T23:23:09.258526892Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:09.258812 env[1351]: time="2024-02-08T23:23:09.258627693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:09.258812 env[1351]: time="2024-02-08T23:23:09.258664593Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:09.267455 env[1351]: time="2024-02-08T23:23:09.258883694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b pid=4058 runtime=io.containerd.runc.v2 Feb 8 23:23:09.293333 systemd[1]: Started cri-containerd-130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b.scope. Feb 8 23:23:09.310000 audit[4079]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=4079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:09.317684 kernel: kauditd_printk_skb: 328 callbacks suppressed Feb 8 23:23:09.317789 kernel: audit: type=1325 audit(1707434589.310:1254): table=filter:107 family=2 entries=11 op=nft_register_rule pid=4079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:09.310000 audit[4079]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc7a9e2b80 a2=0 a3=7ffc7a9e2b6c items=0 ppid=2624 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.356458 kernel: audit: type=1300 audit(1707434589.310:1254): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc7a9e2b80 a2=0 a3=7ffc7a9e2b6c items=0 ppid=2624 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:09.370528 kernel: audit: type=1327 audit(1707434589.310:1254): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386477 kernel: audit: type=1400 audit(1707434589.342:1255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.403469 kernel: audit: type=1400 audit(1707434589.342:1256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.438389 kernel: audit: type=1400 audit(1707434589.342:1257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.438499 kernel: audit: type=1400 audit(1707434589.342:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.468582 kernel: audit: type=1400 audit(1707434589.342:1259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.468723 kernel: audit: type=1400 audit(1707434589.342:1260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.483554 kernel: audit: type=1400 audit(1707434589.342:1261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.356000 audit[4079]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:09.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.358000 audit: BPF prog-id=165 op=LOAD Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306361303138376332383034393031666336366236643265613131 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306361303138376332383034393031666336366236643265613131 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.356000 audit[4079]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc7a9e2b80 a2=0 a3=7ffc7a9e2b6c items=0 ppid=2624 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:09.359000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.359000 audit: BPF prog-id=166 op=LOAD Feb 8 23:23:09.359000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002190d0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306361303138376332383034393031666336366236643265613131 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.386000 audit: BPF prog-id=167 op=LOAD Feb 8 23:23:09.386000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219118 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306361303138376332383034393031666336366236643265613131 Feb 8 23:23:09.387000 audit: BPF prog-id=167 op=UNLOAD Feb 8 23:23:09.387000 audit: BPF prog-id=166 op=UNLOAD Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:09.388000 audit: BPF prog-id=168 op=LOAD Feb 8 23:23:09.388000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219528 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306361303138376332383034393031666336366236643265613131 Feb 8 23:23:09.442000 audit[4092]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:09.442000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffe54abf30 a2=0 a3=7fffe54abf1c items=0 ppid=2624 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:09.443000 audit[4092]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:09.443000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffe54abf30 a2=0 a3=7fffe54abf1c items=0 ppid=2624 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:09.500000 audit[4094]: NETFILTER_CFG table=filter:111 family=2 entries=38 op=nft_register_chain pid=4094 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:09.500000 audit[4094]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffe17786580 a2=0 a3=7ffe1778656c items=0 ppid=3588 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:09.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:09.512789 env[1351]: time="2024-02-08T23:23:09.512740990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cc5c557f6-c4s7j,Uid:c1e49220-1f0b-4e2e-b993-a20b4c0606a0,Namespace:calico-system,Attempt:1,} returns sandbox id \"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b\"" Feb 8 23:23:09.891673 systemd-networkd[1493]: cali5a80d4c3fb4: Gained IPv6LL Feb 8 23:23:10.019633 systemd-networkd[1493]: calibbffad55287: Gained IPv6LL Feb 8 23:23:10.915644 systemd-networkd[1493]: cali4883e41e1d4: Gained IPv6LL Feb 8 23:23:10.952087 env[1351]: time="2024-02-08T23:23:10.952036080Z" level=info msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" Feb 8 23:23:10.988992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1348785191.mount: Deactivated successfully. Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] k8s.go 578: Cleaning up netns ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" iface="eth0" netns="/var/run/netns/cni-c3f5e850-24d6-efe8-c12b-118d9515f9eb" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" iface="eth0" netns="/var/run/netns/cni-c3f5e850-24d6-efe8-c12b-118d9515f9eb" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" iface="eth0" netns="/var/run/netns/cni-c3f5e850-24d6-efe8-c12b-118d9515f9eb" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] k8s.go 585: Releasing IP address(es) ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.017 [INFO][4115] utils.go 188: Calico CNI releasing IP address ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.039 [INFO][4122] ipam_plugin.go 415: Releasing address using handleID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.039 [INFO][4122] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.039 [INFO][4122] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.045 [WARNING][4122] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.045 [INFO][4122] ipam_plugin.go 443: Releasing address using workloadID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.047 [INFO][4122] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:11.050120 env[1351]: 2024-02-08 23:23:11.049 [INFO][4115] k8s.go 591: Teardown processing complete. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:11.051574 env[1351]: time="2024-02-08T23:23:11.051518406Z" level=info msg="TearDown network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" successfully" Feb 8 23:23:11.051722 env[1351]: time="2024-02-08T23:23:11.051701807Z" level=info msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" returns successfully" Feb 8 23:23:11.052642 env[1351]: time="2024-02-08T23:23:11.052608311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6d6s9,Uid:d16009aa-04a4-4f60-89b0-c84594d97ec5,Namespace:kube-system,Attempt:1,}" Feb 8 23:23:11.054014 systemd[1]: run-netns-cni\x2dc3f5e850\x2d24d6\x2defe8\x2dc12b\x2d118d9515f9eb.mount: Deactivated successfully. Feb 8 23:23:11.247539 systemd-networkd[1493]: cali12d01a5daa4: Link UP Feb 8 23:23:11.261080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:11.261166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali12d01a5daa4: link becomes ready Feb 8 23:23:11.261578 systemd-networkd[1493]: cali12d01a5daa4: Gained carrier Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.183 [INFO][4128] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0 coredns-5dd5756b68- kube-system d16009aa-04a4-4f60-89b0-c84594d97ec5 843 0 2024-02-08 23:21:46 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 coredns-5dd5756b68-6d6s9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali12d01a5daa4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.183 [INFO][4128] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.212 [INFO][4139] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" HandleID="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.222 [INFO][4139] ipam_plugin.go 268: Auto assigning IP ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" HandleID="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022fbe0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"coredns-5dd5756b68-6d6s9", "timestamp":"2024-02-08 23:23:11.212668395 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.222 [INFO][4139] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.222 [INFO][4139] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.222 [INFO][4139] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.223 [INFO][4139] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.226 [INFO][4139] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.229 [INFO][4139] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.231 [INFO][4139] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.233 [INFO][4139] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.233 [INFO][4139] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.234 [INFO][4139] ipam.go 1682: Creating new handle: k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9 Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.237 [INFO][4139] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.242 [INFO][4139] ipam.go 1216: Successfully claimed IPs: [192.168.13.132/26] block=192.168.13.128/26 handle="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.242 [INFO][4139] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.132/26] handle="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.242 [INFO][4139] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:11.276671 env[1351]: 2024-02-08 23:23:11.242 [INFO][4139] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.132/26] IPv6=[] ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" HandleID="k8s-pod-network.a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.244 [INFO][4128] k8s.go 385: Populated endpoint ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"d16009aa-04a4-4f60-89b0-c84594d97ec5", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"coredns-5dd5756b68-6d6s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali12d01a5daa4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.244 [INFO][4128] k8s.go 386: Calico CNI using IPs: [192.168.13.132/32] ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.244 [INFO][4128] dataplane_linux.go 68: Setting the host side veth name to cali12d01a5daa4 ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.262 [INFO][4128] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.262 [INFO][4128] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"d16009aa-04a4-4f60-89b0-c84594d97ec5", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9", Pod:"coredns-5dd5756b68-6d6s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali12d01a5daa4", MAC:"de:e4:24:6e:0d:7c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:11.278628 env[1351]: 2024-02-08 23:23:11.273 [INFO][4128] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9" Namespace="kube-system" Pod="coredns-5dd5756b68-6d6s9" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:11.294000 audit[4160]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=4160 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:11.294000 audit[4160]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffe1507ce60 a2=0 a3=7ffe1507ce4c items=0 ppid=3588 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:11.302547 env[1351]: time="2024-02-08T23:23:11.302471478Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:11.302547 env[1351]: time="2024-02-08T23:23:11.302512878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:11.302887 env[1351]: time="2024-02-08T23:23:11.302527978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:11.302887 env[1351]: time="2024-02-08T23:23:11.302687579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9 pid=4169 runtime=io.containerd.runc.v2 Feb 8 23:23:11.319244 systemd[1]: Started cri-containerd-a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9.scope. Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.338000 audit: BPF prog-id=169 op=LOAD Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4169 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136336139303630356239633964626461336466303035616634323466 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4169 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136336139303630356239633964626461336466303035616634323466 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit: BPF prog-id=170 op=LOAD Feb 8 23:23:11.339000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024370 items=0 ppid=4169 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136336139303630356239633964626461336466303035616634323466 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit: BPF prog-id=171 op=LOAD Feb 8 23:23:11.339000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243b8 items=0 ppid=4169 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136336139303630356239633964626461336466303035616634323466 Feb 8 23:23:11.339000 audit: BPF prog-id=171 op=UNLOAD Feb 8 23:23:11.339000 audit: BPF prog-id=170 op=UNLOAD Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.339000 audit: BPF prog-id=172 op=LOAD Feb 8 23:23:11.339000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247c8 items=0 ppid=4169 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136336139303630356239633964626461336466303035616634323466 Feb 8 23:23:11.379165 env[1351]: time="2024-02-08T23:23:11.379122006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6d6s9,Uid:d16009aa-04a4-4f60-89b0-c84594d97ec5,Namespace:kube-system,Attempt:1,} returns sandbox id \"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9\"" Feb 8 23:23:11.382009 env[1351]: time="2024-02-08T23:23:11.381973318Z" level=info msg="CreateContainer within sandbox \"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 8 23:23:11.416546 env[1351]: time="2024-02-08T23:23:11.416493765Z" level=info msg="CreateContainer within sandbox \"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f716ba127da21ba7cb8ad30abc9382077f5818eccba245d0bf1f6b8bb7e382e6\"" Feb 8 23:23:11.419176 env[1351]: time="2024-02-08T23:23:11.418731675Z" level=info msg="StartContainer for \"f716ba127da21ba7cb8ad30abc9382077f5818eccba245d0bf1f6b8bb7e382e6\"" Feb 8 23:23:11.441814 systemd[1]: Started cri-containerd-f716ba127da21ba7cb8ad30abc9382077f5818eccba245d0bf1f6b8bb7e382e6.scope. Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.454000 audit: BPF prog-id=173 op=LOAD Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4169 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637313662613132376461323162613763623861643330616263393338 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4169 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637313662613132376461323162613763623861643330616263393338 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.455000 audit: BPF prog-id=174 op=LOAD Feb 8 23:23:11.455000 audit[4219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024820 items=0 ppid=4169 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637313662613132376461323162613763623861643330616263393338 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.456000 audit: BPF prog-id=175 op=LOAD Feb 8 23:23:11.456000 audit[4219]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024868 items=0 ppid=4169 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637313662613132376461323162613763623861643330616263393338 Feb 8 23:23:11.457000 audit: BPF prog-id=175 op=UNLOAD Feb 8 23:23:11.457000 audit: BPF prog-id=174 op=UNLOAD Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.457000 audit: BPF prog-id=176 op=LOAD Feb 8 23:23:11.457000 audit[4219]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024c78 items=0 ppid=4169 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637313662613132376461323162613763623861643330616263393338 Feb 8 23:23:11.486583 env[1351]: time="2024-02-08T23:23:11.486533664Z" level=info msg="StartContainer for \"f716ba127da21ba7cb8ad30abc9382077f5818eccba245d0bf1f6b8bb7e382e6\" returns successfully" Feb 8 23:23:11.743825 env[1351]: time="2024-02-08T23:23:11.743771463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:11.750939 env[1351]: time="2024-02-08T23:23:11.750895094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:11.755194 env[1351]: time="2024-02-08T23:23:11.755161812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:11.761665 env[1351]: time="2024-02-08T23:23:11.761630739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:11.762243 env[1351]: time="2024-02-08T23:23:11.762211842Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 8 23:23:11.763380 env[1351]: time="2024-02-08T23:23:11.763348947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 8 23:23:11.764594 env[1351]: time="2024-02-08T23:23:11.764566552Z" level=info msg="CreateContainer within sandbox \"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 8 23:23:11.805310 env[1351]: time="2024-02-08T23:23:11.805275126Z" level=info msg="CreateContainer within sandbox \"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1b55b6518f17deb343d500c13c44d859b87a4c60cc01bee3346217c3484f8b75\"" Feb 8 23:23:11.805755 env[1351]: time="2024-02-08T23:23:11.805728928Z" level=info msg="StartContainer for \"1b55b6518f17deb343d500c13c44d859b87a4c60cc01bee3346217c3484f8b75\"" Feb 8 23:23:11.824019 systemd[1]: Started cri-containerd-1b55b6518f17deb343d500c13c44d859b87a4c60cc01bee3346217c3484f8b75.scope. Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3911 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353562363531386631376465623334336435303063313363343464 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit: BPF prog-id=177 op=LOAD Feb 8 23:23:11.841000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024b10 items=0 ppid=3911 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353562363531386631376465623334336435303063313363343464 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit: BPF prog-id=178 op=LOAD Feb 8 23:23:11.841000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024b58 items=0 ppid=3911 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353562363531386631376465623334336435303063313363343464 Feb 8 23:23:11.841000 audit: BPF prog-id=178 op=UNLOAD Feb 8 23:23:11.841000 audit: BPF prog-id=177 op=UNLOAD Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:11.841000 audit: BPF prog-id=179 op=LOAD Feb 8 23:23:11.841000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024be8 items=0 ppid=3911 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353562363531386631376465623334336435303063313363343464 Feb 8 23:23:11.861555 env[1351]: time="2024-02-08T23:23:11.861420366Z" level=info msg="StartContainer for \"1b55b6518f17deb343d500c13c44d859b87a4c60cc01bee3346217c3484f8b75\" returns successfully" Feb 8 23:23:12.230424 kubelet[2469]: I0208 23:23:12.230389 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-6d6s9" podStartSLOduration=86.230345937 podCreationTimestamp="2024-02-08 23:21:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-08 23:23:12.229691134 +0000 UTC m=+99.472220905" watchObservedRunningTime="2024-02-08 23:23:12.230345937 +0000 UTC m=+99.472875808" Feb 8 23:23:12.250000 audit[4286]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:12.250000 audit[4286]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd34acec50 a2=0 a3=7ffd34acec3c items=0 ppid=2624 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:12.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:12.255000 audit[4286]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:12.255000 audit[4286]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd34acec50 a2=0 a3=7ffd34acec3c items=0 ppid=2624 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:12.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:12.286000 audit[4288]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:12.286000 audit[4288]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcd831d4f0 a2=0 a3=7ffcd831d4dc items=0 ppid=2624 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:12.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:12.309000 audit[4288]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:12.309000 audit[4288]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcd831d4f0 a2=0 a3=7ffcd831d4dc items=0 ppid=2624 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:12.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:12.451627 systemd-networkd[1493]: cali12d01a5daa4: Gained IPv6LL Feb 8 23:23:16.750006 env[1351]: time="2024-02-08T23:23:16.749947867Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:16.757159 env[1351]: time="2024-02-08T23:23:16.757116597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:16.762583 env[1351]: time="2024-02-08T23:23:16.762548420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:16.772341 env[1351]: time="2024-02-08T23:23:16.772304560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:16.773173 env[1351]: time="2024-02-08T23:23:16.773139964Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 8 23:23:16.783758 env[1351]: time="2024-02-08T23:23:16.783731808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 8 23:23:16.792898 env[1351]: time="2024-02-08T23:23:16.792866646Z" level=info msg="CreateContainer within sandbox \"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 8 23:23:16.822644 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount417567759.mount: Deactivated successfully. Feb 8 23:23:16.834185 env[1351]: time="2024-02-08T23:23:16.834144618Z" level=info msg="CreateContainer within sandbox \"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70\"" Feb 8 23:23:16.835688 env[1351]: time="2024-02-08T23:23:16.835660525Z" level=info msg="StartContainer for \"b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70\"" Feb 8 23:23:16.859522 systemd[1]: Started cri-containerd-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70.scope. Feb 8 23:23:16.894424 kernel: kauditd_printk_skb: 234 callbacks suppressed Feb 8 23:23:16.894603 kernel: audit: type=1400 audit(1707434596.875:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.920608 kernel: audit: type=1400 audit(1707434596.875:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.920784 kernel: audit: type=1400 audit(1707434596.875:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.934649 kernel: audit: type=1400 audit(1707434596.875:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.948276 kernel: audit: type=1400 audit(1707434596.875:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.976511 kernel: audit: type=1400 audit(1707434596.875:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.976609 kernel: audit: type=1400 audit(1707434596.875:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.992794 kernel: audit: type=1400 audit(1707434596.875:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.007313 kernel: audit: type=1400 audit(1707434596.875:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.008285 env[1351]: time="2024-02-08T23:23:17.008236444Z" level=info msg="StartContainer for \"b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70\" returns successfully" Feb 8 23:23:17.021449 kernel: audit: type=1400 audit(1707434596.875:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.875000 audit: BPF prog-id=180 op=LOAD Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4058 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386137636365303730623761366332613064623633343330386639 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4058 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386137636365303730623761366332613064623633343330386639 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.876000 audit: BPF prog-id=181 op=LOAD Feb 8 23:23:16.876000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000263e90 items=0 ppid=4058 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386137636365303730623761366332613064623633343330386639 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.879000 audit: BPF prog-id=182 op=LOAD Feb 8 23:23:16.879000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000263ed8 items=0 ppid=4058 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386137636365303730623761366332613064623633343330386639 Feb 8 23:23:16.893000 audit: BPF prog-id=182 op=UNLOAD Feb 8 23:23:16.893000 audit: BPF prog-id=181 op=UNLOAD Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:16.893000 audit: BPF prog-id=183 op=LOAD Feb 8 23:23:16.893000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0004022e8 items=0 ppid=4058 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386137636365303730623761366332613064623633343330386639 Feb 8 23:23:17.316204 kubelet[2469]: I0208 23:23:17.316168 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6cc5c557f6-c4s7j" podStartSLOduration=66.057463357 podCreationTimestamp="2024-02-08 23:22:04 +0000 UTC" firstStartedPulling="2024-02-08 23:23:09.514899999 +0000 UTC m=+96.757429770" lastFinishedPulling="2024-02-08 23:23:16.773543965 +0000 UTC m=+104.016073736" observedRunningTime="2024-02-08 23:23:17.252489659 +0000 UTC m=+104.495019530" watchObservedRunningTime="2024-02-08 23:23:17.316107323 +0000 UTC m=+104.558637094" Feb 8 23:23:19.227315 env[1351]: time="2024-02-08T23:23:19.227262636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:19.235750 env[1351]: time="2024-02-08T23:23:19.235621571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:19.242003 env[1351]: time="2024-02-08T23:23:19.241960997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:19.247711 env[1351]: time="2024-02-08T23:23:19.247676921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:19.248216 env[1351]: time="2024-02-08T23:23:19.248183523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 8 23:23:19.250383 env[1351]: time="2024-02-08T23:23:19.250351932Z" level=info msg="CreateContainer within sandbox \"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 8 23:23:19.282607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3278660705.mount: Deactivated successfully. Feb 8 23:23:19.301756 env[1351]: time="2024-02-08T23:23:19.301598843Z" level=info msg="CreateContainer within sandbox \"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d22a5707bd02b4906153d8905775b05380e8dd541071a56734fd1a419ea8f06e\"" Feb 8 23:23:19.302531 env[1351]: time="2024-02-08T23:23:19.302462146Z" level=info msg="StartContainer for \"d22a5707bd02b4906153d8905775b05380e8dd541071a56734fd1a419ea8f06e\"" Feb 8 23:23:19.331528 systemd[1]: run-containerd-runc-k8s.io-d22a5707bd02b4906153d8905775b05380e8dd541071a56734fd1a419ea8f06e-runc.fQTg0C.mount: Deactivated successfully. Feb 8 23:23:19.334619 systemd[1]: Started cri-containerd-d22a5707bd02b4906153d8905775b05380e8dd541071a56734fd1a419ea8f06e.scope. Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3911 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432326135373037626430326234393036313533643839303537373562 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit: BPF prog-id=184 op=LOAD Feb 8 23:23:19.350000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00036a080 items=0 ppid=3911 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432326135373037626430326234393036313533643839303537373562 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit: BPF prog-id=185 op=LOAD Feb 8 23:23:19.350000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00036a0c8 items=0 ppid=3911 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432326135373037626430326234393036313533643839303537373562 Feb 8 23:23:19.350000 audit: BPF prog-id=185 op=UNLOAD Feb 8 23:23:19.350000 audit: BPF prog-id=184 op=UNLOAD Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:19.350000 audit: BPF prog-id=186 op=LOAD Feb 8 23:23:19.350000 audit[4366]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00036a158 items=0 ppid=3911 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432326135373037626430326234393036313533643839303537373562 Feb 8 23:23:19.369911 env[1351]: time="2024-02-08T23:23:19.369849724Z" level=info msg="StartContainer for \"d22a5707bd02b4906153d8905775b05380e8dd541071a56734fd1a419ea8f06e\" returns successfully" Feb 8 23:23:20.128737 kubelet[2469]: I0208 23:23:20.128695 2469 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 8 23:23:20.128737 kubelet[2469]: I0208 23:23:20.128744 2469 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 8 23:23:20.253769 kubelet[2469]: I0208 23:23:20.253729 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qbksc" podStartSLOduration=65.579990867 podCreationTimestamp="2024-02-08 23:22:04 +0000 UTC" firstStartedPulling="2024-02-08 23:23:08.574784231 +0000 UTC m=+95.817314002" lastFinishedPulling="2024-02-08 23:23:19.248467824 +0000 UTC m=+106.490997595" observedRunningTime="2024-02-08 23:23:20.252692456 +0000 UTC m=+107.495222227" watchObservedRunningTime="2024-02-08 23:23:20.25367446 +0000 UTC m=+107.496204231" Feb 8 23:23:28.704506 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 8 23:23:28.704676 kernel: audit: type=1400 audit(1707434608.698:1348): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:28.698000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:28.698000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018be990 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:28.743115 kernel: audit: type=1300 audit(1707434608.698:1348): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018be990 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:28.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:28.760554 kernel: audit: type=1327 audit(1707434608.698:1348): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:28.777035 kernel: audit: type=1400 audit(1707434608.700:1349): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:28.700000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:28.700000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001683360 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:28.777452 kernel: audit: type=1300 audit(1707434608.700:1349): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001683360 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:28.798863 kernel: audit: type=1327 audit(1707434608.700:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:28.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:29.608000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.608000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d0d4e40 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.646771 kernel: audit: type=1400 audit(1707434609.608:1350): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.646958 kernel: audit: type=1300 audit(1707434609.608:1350): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d0d4e40 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.647525 kernel: audit: type=1327 audit(1707434609.608:1350): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.664931 kernel: audit: type=1400 audit(1707434609.662:1351): avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.662000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.662000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0078089f0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.662000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.662000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00649a600 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.662000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.662000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007808a50 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.728000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.728000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00649b1c0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.728000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:29.761000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:29.761000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d0d5230 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:23:29.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:23:32.923905 env[1351]: time="2024-02-08T23:23:32.923849120Z" level=info msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.960 [WARNING][4437] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"d16009aa-04a4-4f60-89b0-c84594d97ec5", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9", Pod:"coredns-5dd5756b68-6d6s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali12d01a5daa4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.960 [INFO][4437] k8s.go 578: Cleaning up netns ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.960 [INFO][4437] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" iface="eth0" netns="" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.960 [INFO][4437] k8s.go 585: Releasing IP address(es) ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.960 [INFO][4437] utils.go 188: Calico CNI releasing IP address ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.979 [INFO][4445] ipam_plugin.go 415: Releasing address using handleID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.979 [INFO][4445] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.979 [INFO][4445] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.985 [WARNING][4445] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.985 [INFO][4445] ipam_plugin.go 443: Releasing address using workloadID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.986 [INFO][4445] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:32.988825 env[1351]: 2024-02-08 23:23:32.987 [INFO][4437] k8s.go 591: Teardown processing complete. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:32.989513 env[1351]: time="2024-02-08T23:23:32.988848909Z" level=info msg="TearDown network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" successfully" Feb 8 23:23:32.989513 env[1351]: time="2024-02-08T23:23:32.988891510Z" level=info msg="StopPodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" returns successfully" Feb 8 23:23:32.989964 env[1351]: time="2024-02-08T23:23:32.989922834Z" level=info msg="RemovePodSandbox for \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" Feb 8 23:23:32.990108 env[1351]: time="2024-02-08T23:23:32.989968235Z" level=info msg="Forcibly stopping sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\"" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.021 [WARNING][4463] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"d16009aa-04a4-4f60-89b0-c84594d97ec5", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"a63a90605b9c9dbda3df005af424f78398271541d8b26caa54f80b99422506f9", Pod:"coredns-5dd5756b68-6d6s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali12d01a5daa4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.021 [INFO][4463] k8s.go 578: Cleaning up netns ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.022 [INFO][4463] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" iface="eth0" netns="" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.022 [INFO][4463] k8s.go 585: Releasing IP address(es) ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.022 [INFO][4463] utils.go 188: Calico CNI releasing IP address ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.040 [INFO][4469] ipam_plugin.go 415: Releasing address using handleID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.040 [INFO][4469] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.041 [INFO][4469] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.046 [WARNING][4469] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.046 [INFO][4469] ipam_plugin.go 443: Releasing address using workloadID ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" HandleID="k8s-pod-network.76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6d6s9-eth0" Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.048 [INFO][4469] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.052601 env[1351]: 2024-02-08 23:23:33.050 [INFO][4463] k8s.go 591: Teardown processing complete. ContainerID="76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c" Feb 8 23:23:33.053294 env[1351]: time="2024-02-08T23:23:33.052628156Z" level=info msg="TearDown network for sandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" successfully" Feb 8 23:23:33.062762 env[1351]: time="2024-02-08T23:23:33.062670383Z" level=info msg="RemovePodSandbox \"76782e1f945e0dbc53ee72b7633aa8b398a3cac651fc7a15deb2d2a7dec04f6c\" returns successfully" Feb 8 23:23:33.063348 env[1351]: time="2024-02-08T23:23:33.063312698Z" level=info msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.095 [WARNING][4488] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9bca606b-cc36-49e9-ac06-22a6a4103dca", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed", Pod:"coredns-5dd5756b68-6k72j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibbffad55287", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.095 [INFO][4488] k8s.go 578: Cleaning up netns ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.095 [INFO][4488] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" iface="eth0" netns="" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.095 [INFO][4488] k8s.go 585: Releasing IP address(es) ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.095 [INFO][4488] utils.go 188: Calico CNI releasing IP address ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.114 [INFO][4494] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.114 [INFO][4494] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.114 [INFO][4494] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.121 [WARNING][4494] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.121 [INFO][4494] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.122 [INFO][4494] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.124358 env[1351]: 2024-02-08 23:23:33.123 [INFO][4488] k8s.go 591: Teardown processing complete. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.125028 env[1351]: time="2024-02-08T23:23:33.124392781Z" level=info msg="TearDown network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" successfully" Feb 8 23:23:33.125028 env[1351]: time="2024-02-08T23:23:33.124448482Z" level=info msg="StopPodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" returns successfully" Feb 8 23:23:33.125322 env[1351]: time="2024-02-08T23:23:33.125267600Z" level=info msg="RemovePodSandbox for \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" Feb 8 23:23:33.125460 env[1351]: time="2024-02-08T23:23:33.125310901Z" level=info msg="Forcibly stopping sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\"" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.160 [WARNING][4512] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9bca606b-cc36-49e9-ac06-22a6a4103dca", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 21, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"19054893cb2c61410898f75460a0856e9fcd6893d2f7b080e915317453a8c6ed", Pod:"coredns-5dd5756b68-6k72j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibbffad55287", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.161 [INFO][4512] k8s.go 578: Cleaning up netns ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.161 [INFO][4512] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" iface="eth0" netns="" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.161 [INFO][4512] k8s.go 585: Releasing IP address(es) ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.161 [INFO][4512] utils.go 188: Calico CNI releasing IP address ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.179 [INFO][4518] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.180 [INFO][4518] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.180 [INFO][4518] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.185 [WARNING][4518] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.185 [INFO][4518] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" HandleID="k8s-pod-network.4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-coredns--5dd5756b68--6k72j-eth0" Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.186 [INFO][4518] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.190629 env[1351]: 2024-02-08 23:23:33.187 [INFO][4512] k8s.go 591: Teardown processing complete. ContainerID="4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79" Feb 8 23:23:33.190629 env[1351]: time="2024-02-08T23:23:33.188589334Z" level=info msg="TearDown network for sandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" successfully" Feb 8 23:23:33.199756 env[1351]: time="2024-02-08T23:23:33.199674185Z" level=info msg="RemovePodSandbox \"4e234afb9fa39b4ede5b2bdfe69227fb70f270c18d8c4cac18181506d2d5eb79\" returns successfully" Feb 8 23:23:33.200257 env[1351]: time="2024-02-08T23:23:33.200226697Z" level=info msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.233 [WARNING][4536] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0", GenerateName:"calico-kube-controllers-6cc5c557f6-", Namespace:"calico-system", SelfLink:"", UID:"c1e49220-1f0b-4e2e-b993-a20b4c0606a0", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cc5c557f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b", Pod:"calico-kube-controllers-6cc5c557f6-c4s7j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4883e41e1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.234 [INFO][4536] k8s.go 578: Cleaning up netns ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.234 [INFO][4536] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" iface="eth0" netns="" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.234 [INFO][4536] k8s.go 585: Releasing IP address(es) ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.234 [INFO][4536] utils.go 188: Calico CNI releasing IP address ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.252 [INFO][4542] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.252 [INFO][4542] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.252 [INFO][4542] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.257 [WARNING][4542] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.257 [INFO][4542] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.259 [INFO][4542] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.260946 env[1351]: 2024-02-08 23:23:33.259 [INFO][4536] k8s.go 591: Teardown processing complete. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.261647 env[1351]: time="2024-02-08T23:23:33.260969673Z" level=info msg="TearDown network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" successfully" Feb 8 23:23:33.261647 env[1351]: time="2024-02-08T23:23:33.261014874Z" level=info msg="StopPodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" returns successfully" Feb 8 23:23:33.261647 env[1351]: time="2024-02-08T23:23:33.261603687Z" level=info msg="RemovePodSandbox for \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" Feb 8 23:23:33.261831 env[1351]: time="2024-02-08T23:23:33.261645388Z" level=info msg="Forcibly stopping sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\"" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.313 [WARNING][4560] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0", GenerateName:"calico-kube-controllers-6cc5c557f6-", Namespace:"calico-system", SelfLink:"", UID:"c1e49220-1f0b-4e2e-b993-a20b4c0606a0", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cc5c557f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"130ca0187c2804901fc66b6d2ea11ba142b66be12a009971f606526cf007c16b", Pod:"calico-kube-controllers-6cc5c557f6-c4s7j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4883e41e1d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.313 [INFO][4560] k8s.go 578: Cleaning up netns ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.314 [INFO][4560] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" iface="eth0" netns="" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.314 [INFO][4560] k8s.go 585: Releasing IP address(es) ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.314 [INFO][4560] utils.go 188: Calico CNI releasing IP address ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.332 [INFO][4566] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.332 [INFO][4566] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.332 [INFO][4566] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.337 [WARNING][4566] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.338 [INFO][4566] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" HandleID="k8s-pod-network.ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--kube--controllers--6cc5c557f6--c4s7j-eth0" Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.339 [INFO][4566] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.341289 env[1351]: 2024-02-08 23:23:33.340 [INFO][4560] k8s.go 591: Teardown processing complete. ContainerID="ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666" Feb 8 23:23:33.342144 env[1351]: time="2024-02-08T23:23:33.341323892Z" level=info msg="TearDown network for sandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" successfully" Feb 8 23:23:33.351956 env[1351]: time="2024-02-08T23:23:33.351804629Z" level=info msg="RemovePodSandbox \"ac0bf1803f5b4e08013a7b729bdd9ebf158967f42c355e64973a5ef2876ef666\" returns successfully" Feb 8 23:23:33.352717 env[1351]: time="2024-02-08T23:23:33.352687449Z" level=info msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.383 [WARNING][4584] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe14a064-ff0d-4c55-9eee-3d94032b7cf6", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec", Pod:"csi-node-driver-qbksc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5a80d4c3fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.383 [INFO][4584] k8s.go 578: Cleaning up netns ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.383 [INFO][4584] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" iface="eth0" netns="" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.384 [INFO][4584] k8s.go 585: Releasing IP address(es) ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.384 [INFO][4584] utils.go 188: Calico CNI releasing IP address ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.402 [INFO][4590] ipam_plugin.go 415: Releasing address using handleID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.402 [INFO][4590] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.402 [INFO][4590] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.409 [WARNING][4590] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.409 [INFO][4590] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.410 [INFO][4590] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.413283 env[1351]: 2024-02-08 23:23:33.411 [INFO][4584] k8s.go 591: Teardown processing complete. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.413909 env[1351]: time="2024-02-08T23:23:33.413320322Z" level=info msg="TearDown network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" successfully" Feb 8 23:23:33.413909 env[1351]: time="2024-02-08T23:23:33.413366923Z" level=info msg="StopPodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" returns successfully" Feb 8 23:23:33.414581 env[1351]: time="2024-02-08T23:23:33.414526049Z" level=info msg="RemovePodSandbox for \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" Feb 8 23:23:33.414766 env[1351]: time="2024-02-08T23:23:33.414586550Z" level=info msg="Forcibly stopping sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\"" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.446 [WARNING][4610] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fe14a064-ff0d-4c55-9eee-3d94032b7cf6", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"48ed04609e019e66fcae0a7ed9e50d5cd4c4f85517a4519067afae1b36ac9aec", Pod:"csi-node-driver-qbksc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5a80d4c3fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.446 [INFO][4610] k8s.go 578: Cleaning up netns ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.446 [INFO][4610] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" iface="eth0" netns="" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.446 [INFO][4610] k8s.go 585: Releasing IP address(es) ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.446 [INFO][4610] utils.go 188: Calico CNI releasing IP address ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.467 [INFO][4618] ipam_plugin.go 415: Releasing address using handleID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.467 [INFO][4618] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.467 [INFO][4618] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.475 [WARNING][4618] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.476 [INFO][4618] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" HandleID="k8s-pod-network.a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-csi--node--driver--qbksc-eth0" Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.477 [INFO][4618] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:33.481571 env[1351]: 2024-02-08 23:23:33.478 [INFO][4610] k8s.go 591: Teardown processing complete. ContainerID="a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d" Feb 8 23:23:33.481571 env[1351]: time="2024-02-08T23:23:33.479141612Z" level=info msg="TearDown network for sandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" successfully" Feb 8 23:23:33.489242 env[1351]: time="2024-02-08T23:23:33.489188139Z" level=info msg="RemovePodSandbox \"a8ccfe01a97ff2af79bb4592995bfcf333749db235204b47933486f5ff0fb75d\" returns successfully" Feb 8 23:23:39.566951 kubelet[2469]: I0208 23:23:39.566910 2469 topology_manager.go:215] "Topology Admit Handler" podUID="cfb30653-422a-48e2-8f3f-fd87819866c1" podNamespace="calico-apiserver" podName="calico-apiserver-64f8bcddf-wtwf7" Feb 8 23:23:39.574670 systemd[1]: Created slice kubepods-besteffort-podcfb30653_422a_48e2_8f3f_fd87819866c1.slice. Feb 8 23:23:39.587800 kubelet[2469]: I0208 23:23:39.587771 2469 topology_manager.go:215] "Topology Admit Handler" podUID="ecd71942-eee7-4e27-83ab-c501829fdb92" podNamespace="calico-apiserver" podName="calico-apiserver-64f8bcddf-d8sld" Feb 8 23:23:39.594134 systemd[1]: Created slice kubepods-besteffort-podecd71942_eee7_4e27_83ab_c501829fdb92.slice. Feb 8 23:23:39.648484 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 8 23:23:39.648652 kernel: audit: type=1325 audit(1707434619.633:1356): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.633000 audit[4648]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.648815 kubelet[2469]: I0208 23:23:39.645470 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mhwck\" (UniqueName: \"kubernetes.io/projected/cfb30653-422a-48e2-8f3f-fd87819866c1-kube-api-access-mhwck\") pod \"calico-apiserver-64f8bcddf-wtwf7\" (UID: \"cfb30653-422a-48e2-8f3f-fd87819866c1\") " pod="calico-apiserver/calico-apiserver-64f8bcddf-wtwf7" Feb 8 23:23:39.648815 kubelet[2469]: I0208 23:23:39.645521 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ecd71942-eee7-4e27-83ab-c501829fdb92-calico-apiserver-certs\") pod \"calico-apiserver-64f8bcddf-d8sld\" (UID: \"ecd71942-eee7-4e27-83ab-c501829fdb92\") " pod="calico-apiserver/calico-apiserver-64f8bcddf-d8sld" Feb 8 23:23:39.648815 kubelet[2469]: I0208 23:23:39.645546 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqqzg\" (UniqueName: \"kubernetes.io/projected/ecd71942-eee7-4e27-83ab-c501829fdb92-kube-api-access-gqqzg\") pod \"calico-apiserver-64f8bcddf-d8sld\" (UID: \"ecd71942-eee7-4e27-83ab-c501829fdb92\") " pod="calico-apiserver/calico-apiserver-64f8bcddf-d8sld" Feb 8 23:23:39.648815 kubelet[2469]: I0208 23:23:39.645570 2469 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cfb30653-422a-48e2-8f3f-fd87819866c1-calico-apiserver-certs\") pod \"calico-apiserver-64f8bcddf-wtwf7\" (UID: \"cfb30653-422a-48e2-8f3f-fd87819866c1\") " pod="calico-apiserver/calico-apiserver-64f8bcddf-wtwf7" Feb 8 23:23:39.633000 audit[4648]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe45418720 a2=0 a3=7ffe4541870c items=0 ppid=2624 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.671251 kernel: audit: type=1300 audit(1707434619.633:1356): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe45418720 a2=0 a3=7ffe4541870c items=0 ppid=2624 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.683457 kernel: audit: type=1327 audit(1707434619.633:1356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.633000 audit[4648]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.699450 kernel: audit: type=1325 audit(1707434619.633:1357): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.633000 audit[4648]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe45418720 a2=0 a3=7ffe4541870c items=0 ppid=2624 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.732235 kernel: audit: type=1300 audit(1707434619.633:1357): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe45418720 a2=0 a3=7ffe4541870c items=0 ppid=2624 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.732336 kernel: audit: type=1327 audit(1707434619.633:1357): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.732368 kernel: audit: type=1325 audit(1707434619.726:1358): table=filter:119 family=2 entries=10 op=nft_register_rule pid=4650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.726000 audit[4650]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.726000 audit[4650]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe12eee2f0 a2=0 a3=7ffe12eee2dc items=0 ppid=2624 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.746352 kubelet[2469]: E0208 23:23:39.746324 2469 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:23:39.746564 kubelet[2469]: E0208 23:23:39.746551 2469 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cfb30653-422a-48e2-8f3f-fd87819866c1-calico-apiserver-certs podName:cfb30653-422a-48e2-8f3f-fd87819866c1 nodeName:}" failed. No retries permitted until 2024-02-08 23:23:40.246524388 +0000 UTC m=+127.489054159 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/cfb30653-422a-48e2-8f3f-fd87819866c1-calico-apiserver-certs") pod "calico-apiserver-64f8bcddf-wtwf7" (UID: "cfb30653-422a-48e2-8f3f-fd87819866c1") : secret "calico-apiserver-certs" not found Feb 8 23:23:39.746951 kubelet[2469]: E0208 23:23:39.746938 2469 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:23:39.747075 kubelet[2469]: E0208 23:23:39.747067 2469 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ecd71942-eee7-4e27-83ab-c501829fdb92-calico-apiserver-certs podName:ecd71942-eee7-4e27-83ab-c501829fdb92 nodeName:}" failed. No retries permitted until 2024-02-08 23:23:40.247053099 +0000 UTC m=+127.489582870 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ecd71942-eee7-4e27-83ab-c501829fdb92-calico-apiserver-certs") pod "calico-apiserver-64f8bcddf-d8sld" (UID: "ecd71942-eee7-4e27-83ab-c501829fdb92") : secret "calico-apiserver-certs" not found Feb 8 23:23:39.764401 kernel: audit: type=1300 audit(1707434619.726:1358): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe12eee2f0 a2=0 a3=7ffe12eee2dc items=0 ppid=2624 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.776443 kernel: audit: type=1327 audit(1707434619.726:1358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:39.726000 audit[4650]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.796460 kernel: audit: type=1325 audit(1707434619.726:1359): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:39.726000 audit[4650]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe12eee2f0 a2=0 a3=7ffe12eee2dc items=0 ppid=2624 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:39.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:40.250692 kubelet[2469]: E0208 23:23:40.250641 2469 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:23:40.250925 kubelet[2469]: E0208 23:23:40.250727 2469 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ecd71942-eee7-4e27-83ab-c501829fdb92-calico-apiserver-certs podName:ecd71942-eee7-4e27-83ab-c501829fdb92 nodeName:}" failed. No retries permitted until 2024-02-08 23:23:41.250706491 +0000 UTC m=+128.493236262 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ecd71942-eee7-4e27-83ab-c501829fdb92-calico-apiserver-certs") pod "calico-apiserver-64f8bcddf-d8sld" (UID: "ecd71942-eee7-4e27-83ab-c501829fdb92") : secret "calico-apiserver-certs" not found Feb 8 23:23:40.251179 kubelet[2469]: E0208 23:23:40.251153 2469 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:23:40.251277 kubelet[2469]: E0208 23:23:40.251211 2469 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cfb30653-422a-48e2-8f3f-fd87819866c1-calico-apiserver-certs podName:cfb30653-422a-48e2-8f3f-fd87819866c1 nodeName:}" failed. No retries permitted until 2024-02-08 23:23:41.251194602 +0000 UTC m=+128.493724373 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/cfb30653-422a-48e2-8f3f-fd87819866c1-calico-apiserver-certs") pod "calico-apiserver-64f8bcddf-wtwf7" (UID: "cfb30653-422a-48e2-8f3f-fd87819866c1") : secret "calico-apiserver-certs" not found Feb 8 23:23:41.383330 env[1351]: time="2024-02-08T23:23:41.383280687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64f8bcddf-wtwf7,Uid:cfb30653-422a-48e2-8f3f-fd87819866c1,Namespace:calico-apiserver,Attempt:0,}" Feb 8 23:23:41.402737 env[1351]: time="2024-02-08T23:23:41.402690688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64f8bcddf-d8sld,Uid:ecd71942-eee7-4e27-83ab-c501829fdb92,Namespace:calico-apiserver,Attempt:0,}" Feb 8 23:23:41.627404 systemd-networkd[1493]: cali39fb4ec109f: Link UP Feb 8 23:23:41.631781 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:41.638520 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali39fb4ec109f: link becomes ready Feb 8 23:23:41.638228 systemd-networkd[1493]: cali39fb4ec109f: Gained carrier Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.540 [INFO][4666] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0 calico-apiserver-64f8bcddf- calico-apiserver ecd71942-eee7-4e27-83ab-c501829fdb92 978 0 2024-02-08 23:23:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64f8bcddf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 calico-apiserver-64f8bcddf-d8sld eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali39fb4ec109f [] []}} ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.540 [INFO][4666] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.587 [INFO][4684] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" HandleID="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.597 [INFO][4684] ipam_plugin.go 268: Auto assigning IP ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" HandleID="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c9f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"calico-apiserver-64f8bcddf-d8sld", "timestamp":"2024-02-08 23:23:41.587814217 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.597 [INFO][4684] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.597 [INFO][4684] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.597 [INFO][4684] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.599 [INFO][4684] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.603 [INFO][4684] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.606 [INFO][4684] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.607 [INFO][4684] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.609 [INFO][4684] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.609 [INFO][4684] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.610 [INFO][4684] ipam.go 1682: Creating new handle: k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1 Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.613 [INFO][4684] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.621 [INFO][4684] ipam.go 1216: Successfully claimed IPs: [192.168.13.133/26] block=192.168.13.128/26 handle="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.621 [INFO][4684] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.133/26] handle="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.621 [INFO][4684] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:41.651720 env[1351]: 2024-02-08 23:23:41.621 [INFO][4684] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.133/26] IPv6=[] ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" HandleID="k8s-pod-network.172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.623 [INFO][4666] k8s.go 385: Populated endpoint ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0", GenerateName:"calico-apiserver-64f8bcddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecd71942-eee7-4e27-83ab-c501829fdb92", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64f8bcddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"calico-apiserver-64f8bcddf-d8sld", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali39fb4ec109f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.623 [INFO][4666] k8s.go 386: Calico CNI using IPs: [192.168.13.133/32] ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.623 [INFO][4666] dataplane_linux.go 68: Setting the host side veth name to cali39fb4ec109f ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.639 [INFO][4666] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.640 [INFO][4666] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0", GenerateName:"calico-apiserver-64f8bcddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecd71942-eee7-4e27-83ab-c501829fdb92", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64f8bcddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1", Pod:"calico-apiserver-64f8bcddf-d8sld", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali39fb4ec109f", MAC:"c6:73:9c:eb:9e:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:41.652694 env[1351]: 2024-02-08 23:23:41.650 [INFO][4666] k8s.go 491: Wrote updated endpoint to datastore ContainerID="172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-d8sld" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--d8sld-eth0" Feb 8 23:23:41.683817 systemd-networkd[1493]: calid78dc2b0273: Link UP Feb 8 23:23:41.695455 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid78dc2b0273: link becomes ready Feb 8 23:23:41.696121 systemd-networkd[1493]: calid78dc2b0273: Gained carrier Feb 8 23:23:41.709798 env[1351]: time="2024-02-08T23:23:41.709727138Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.484 [INFO][4655] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0 calico-apiserver-64f8bcddf- calico-apiserver cfb30653-422a-48e2-8f3f-fd87819866c1 976 0 2024-02-08 23:23:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64f8bcddf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-a74a3a29e1 calico-apiserver-64f8bcddf-wtwf7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid78dc2b0273 [] []}} ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.484 [INFO][4655] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.582 [INFO][4676] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" HandleID="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.600 [INFO][4676] ipam_plugin.go 268: Auto assigning IP ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" HandleID="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027da30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-a74a3a29e1", "pod":"calico-apiserver-64f8bcddf-wtwf7", "timestamp":"2024-02-08 23:23:41.582191101 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a74a3a29e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.600 [INFO][4676] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.621 [INFO][4676] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.622 [INFO][4676] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a74a3a29e1' Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.631 [INFO][4676] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.644 [INFO][4676] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.653 [INFO][4676] ipam.go 489: Trying affinity for 192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.656 [INFO][4676] ipam.go 155: Attempting to load block cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.659 [INFO][4676] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.128/26 host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.659 [INFO][4676] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.128/26 handle="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.662 [INFO][4676] ipam.go 1682: Creating new handle: k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2 Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.666 [INFO][4676] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.128/26 handle="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.676 [INFO][4676] ipam.go 1216: Successfully claimed IPs: [192.168.13.134/26] block=192.168.13.128/26 handle="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.677 [INFO][4676] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.134/26] handle="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" host="ci-3510.3.2-a-a74a3a29e1" Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.677 [INFO][4676] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:41.717775 env[1351]: 2024-02-08 23:23:41.677 [INFO][4676] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.134/26] IPv6=[] ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" HandleID="k8s-pod-network.10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Workload="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.678 [INFO][4655] k8s.go 385: Populated endpoint ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0", GenerateName:"calico-apiserver-64f8bcddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"cfb30653-422a-48e2-8f3f-fd87819866c1", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64f8bcddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"", Pod:"calico-apiserver-64f8bcddf-wtwf7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid78dc2b0273", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.679 [INFO][4655] k8s.go 386: Calico CNI using IPs: [192.168.13.134/32] ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.679 [INFO][4655] dataplane_linux.go 68: Setting the host side veth name to calid78dc2b0273 ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.696 [INFO][4655] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.697 [INFO][4655] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0", GenerateName:"calico-apiserver-64f8bcddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"cfb30653-422a-48e2-8f3f-fd87819866c1", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64f8bcddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a74a3a29e1", ContainerID:"10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2", Pod:"calico-apiserver-64f8bcddf-wtwf7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid78dc2b0273", MAC:"fa:6b:32:87:d0:28", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:41.718746 env[1351]: 2024-02-08 23:23:41.713 [INFO][4655] k8s.go 491: Wrote updated endpoint to datastore ContainerID="10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2" Namespace="calico-apiserver" Pod="calico-apiserver-64f8bcddf-wtwf7" WorkloadEndpoint="ci--3510.3.2--a--a74a3a29e1-k8s-calico--apiserver--64f8bcddf--wtwf7-eth0" Feb 8 23:23:41.722497 env[1351]: time="2024-02-08T23:23:41.722390400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:41.722641 env[1351]: time="2024-02-08T23:23:41.722613705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:41.723132 env[1351]: time="2024-02-08T23:23:41.723095615Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1 pid=4718 runtime=io.containerd.runc.v2 Feb 8 23:23:41.743556 systemd[1]: Started cri-containerd-172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1.scope. Feb 8 23:23:41.751592 env[1351]: time="2024-02-08T23:23:41.751523702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:41.751750 env[1351]: time="2024-02-08T23:23:41.751732207Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:41.751861 env[1351]: time="2024-02-08T23:23:41.751838709Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:41.752420 env[1351]: time="2024-02-08T23:23:41.752050713Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2 pid=4760 runtime=io.containerd.runc.v2 Feb 8 23:23:41.766999 systemd[1]: Started cri-containerd-10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2.scope. Feb 8 23:23:41.777000 audit[4779]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:41.777000 audit[4779]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffce61a1430 a2=0 a3=7ffce61a141c items=0 ppid=3588 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.777000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.792000 audit: BPF prog-id=187 op=LOAD Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4718 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326135366633646532636663666239343435383061356437396563 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4718 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326135366633646532636663666239343435383061356437396563 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit: BPF prog-id=188 op=LOAD Feb 8 23:23:41.793000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300350 items=0 ppid=4718 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326135366633646532636663666239343435383061356437396563 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit: BPF prog-id=189 op=LOAD Feb 8 23:23:41.793000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300398 items=0 ppid=4718 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326135366633646532636663666239343435383061356437396563 Feb 8 23:23:41.793000 audit: BPF prog-id=189 op=UNLOAD Feb 8 23:23:41.793000 audit: BPF prog-id=188 op=UNLOAD Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.793000 audit: BPF prog-id=190 op=LOAD Feb 8 23:23:41.793000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003007a8 items=0 ppid=4718 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137326135366633646532636663666239343435383061356437396563 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.813000 audit: BPF prog-id=191 op=LOAD Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656565653936336463303636316466306534323539323130646536 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656565653936336463303636316466306534323539323130646536 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit: BPF prog-id=192 op=LOAD Feb 8 23:23:41.814000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa5a0 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656565653936336463303636316466306534323539323130646536 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.814000 audit: BPF prog-id=193 op=LOAD Feb 8 23:23:41.814000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa5e8 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656565653936336463303636316466306534323539323130646536 Feb 8 23:23:41.814000 audit: BPF prog-id=193 op=UNLOAD Feb 8 23:23:41.814000 audit: BPF prog-id=192 op=UNLOAD Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:41.815000 audit: BPF prog-id=194 op=LOAD Feb 8 23:23:41.815000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aa9f8 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130656565653936336463303636316466306534323539323130646536 Feb 8 23:23:41.831000 audit[4796]: NETFILTER_CFG table=filter:122 family=2 entries=50 op=nft_register_chain pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:41.831000 audit[4796]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffd68a1b1c0 a2=0 a3=7ffd68a1b1ac items=0 ppid=3588 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:41.831000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:41.844991 env[1351]: time="2024-02-08T23:23:41.844949135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64f8bcddf-d8sld,Uid:ecd71942-eee7-4e27-83ab-c501829fdb92,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1\"" Feb 8 23:23:41.847237 env[1351]: time="2024-02-08T23:23:41.847209781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 8 23:23:41.880376 env[1351]: time="2024-02-08T23:23:41.880339566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64f8bcddf-wtwf7,Uid:cfb30653-422a-48e2-8f3f-fd87819866c1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2\"" Feb 8 23:23:42.723588 systemd-networkd[1493]: calid78dc2b0273: Gained IPv6LL Feb 8 23:23:43.299729 systemd-networkd[1493]: cali39fb4ec109f: Gained IPv6LL Feb 8 23:23:45.343076 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 8 23:23:45.343246 kernel: audit: type=1400 audit(1707434625.319:1398): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.319000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.319000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000432600 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.372737 kernel: audit: type=1300 audit(1707434625.319:1398): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000432600 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.394269 kernel: audit: type=1327 audit(1707434625.319:1398): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.344000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.344000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004329e0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.437757 kernel: audit: type=1400 audit(1707434625.344:1399): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.437850 kernel: audit: type=1300 audit(1707434625.344:1399): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004329e0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.457342 kernel: audit: type=1327 audit(1707434625.344:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107ea80 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.500483 kernel: audit: type=1400 audit(1707434625.345:1400): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.500561 kernel: audit: type=1300 audit(1707434625.345:1400): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107ea80 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.520525 kernel: audit: type=1327 audit(1707434625.345:1400): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:45.523117 kernel: audit: type=1400 audit(1707434625.345:1401): avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:23:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107eaa0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:23:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:23:46.235563 env[1351]: time="2024-02-08T23:23:46.235422227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:46.242699 env[1351]: time="2024-02-08T23:23:46.242600368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:46.248069 env[1351]: time="2024-02-08T23:23:46.247988273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:46.252509 env[1351]: time="2024-02-08T23:23:46.252479461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:46.253262 env[1351]: time="2024-02-08T23:23:46.253229176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 8 23:23:46.254740 env[1351]: time="2024-02-08T23:23:46.254711405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 8 23:23:46.257093 env[1351]: time="2024-02-08T23:23:46.257063451Z" level=info msg="CreateContainer within sandbox \"172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 8 23:23:46.289832 env[1351]: time="2024-02-08T23:23:46.289708690Z" level=info msg="CreateContainer within sandbox \"172a56f3de2cfcfb944580a5d79ec293c89fc2c74ce0b7ca844ccecd715b5cf1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e\"" Feb 8 23:23:46.290864 env[1351]: time="2024-02-08T23:23:46.290818712Z" level=info msg="StartContainer for \"c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e\"" Feb 8 23:23:46.326514 systemd[1]: Started cri-containerd-c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e.scope. Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit: BPF prog-id=195 op=LOAD Feb 8 23:23:46.348000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4718 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:46.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332656633643436626635383063623762363339623432663236663261 Feb 8 23:23:46.348000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.348000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4718 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:46.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332656633643436626635383063623762363339623432663236663261 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit: BPF prog-id=196 op=LOAD Feb 8 23:23:46.349000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000288e60 items=0 ppid=4718 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:46.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332656633643436626635383063623762363339623432663236663261 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit: BPF prog-id=197 op=LOAD Feb 8 23:23:46.349000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000288ea8 items=0 ppid=4718 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:46.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332656633643436626635383063623762363339623432663236663261 Feb 8 23:23:46.349000 audit: BPF prog-id=197 op=UNLOAD Feb 8 23:23:46.349000 audit: BPF prog-id=196 op=UNLOAD Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:46.349000 audit: BPF prog-id=198 op=LOAD Feb 8 23:23:46.349000 audit[4818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002892b8 items=0 ppid=4718 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:46.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332656633643436626635383063623762363339623432663236663261 Feb 8 23:23:46.722000 audit[4831]: AVC avc: denied { watch } for pid=4831 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_41.2446437412/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c145 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c145 tclass=file permissive=0 Feb 8 23:23:46.722000 audit[4831]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bac4c0 a2=fc6 a3=0 items=0 ppid=4718 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c145 key=(null) Feb 8 23:23:46.722000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:23:47.011929 env[1351]: time="2024-02-08T23:23:47.010874805Z" level=info msg="StartContainer for \"c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e\" returns successfully" Feb 8 23:23:47.043897 env[1351]: time="2024-02-08T23:23:47.043860644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:47.052001 env[1351]: time="2024-02-08T23:23:47.051967901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:47.057981 env[1351]: time="2024-02-08T23:23:47.057949117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:47.061666 env[1351]: time="2024-02-08T23:23:47.061637688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:47.062327 env[1351]: time="2024-02-08T23:23:47.062294501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 8 23:23:47.064980 env[1351]: time="2024-02-08T23:23:47.064949752Z" level=info msg="CreateContainer within sandbox \"10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 8 23:23:47.106680 env[1351]: time="2024-02-08T23:23:47.106546258Z" level=info msg="CreateContainer within sandbox \"10eeee963dc0661df0e4259210de628d5c50146df370bb2de4d80eb36039c2a2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b\"" Feb 8 23:23:47.107586 env[1351]: time="2024-02-08T23:23:47.107549177Z" level=info msg="StartContainer for \"4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b\"" Feb 8 23:23:47.126901 systemd[1]: Started cri-containerd-4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b.scope. Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit: BPF prog-id=199 op=LOAD Feb 8 23:23:47.143000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.143000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4760 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643734393336616635633862363839666634636330643432333832 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4760 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643734393336616635633862363839666634636330643432333832 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.144000 audit: BPF prog-id=200 op=LOAD Feb 8 23:23:47.144000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038ecf0 items=0 ppid=4760 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643734393336616635633862363839666634636330643432333832 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit: BPF prog-id=201 op=LOAD Feb 8 23:23:47.145000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038ed38 items=0 ppid=4760 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643734393336616635633862363839666634636330643432333832 Feb 8 23:23:47.145000 audit: BPF prog-id=201 op=UNLOAD Feb 8 23:23:47.145000 audit: BPF prog-id=200 op=UNLOAD Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:47.145000 audit: BPF prog-id=202 op=LOAD Feb 8 23:23:47.145000 audit[4863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038f148 items=0 ppid=4760 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643734393336616635633862363839666634636330643432333832 Feb 8 23:23:47.182319 env[1351]: time="2024-02-08T23:23:47.182266224Z" level=info msg="StartContainer for \"4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b\" returns successfully" Feb 8 23:23:47.360630 kubelet[2469]: I0208 23:23:47.360597 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64f8bcddf-wtwf7" podStartSLOduration=3.179725166 podCreationTimestamp="2024-02-08 23:23:39 +0000 UTC" firstStartedPulling="2024-02-08 23:23:41.881796697 +0000 UTC m=+129.124326568" lastFinishedPulling="2024-02-08 23:23:47.062627308 +0000 UTC m=+134.305157079" observedRunningTime="2024-02-08 23:23:47.359096149 +0000 UTC m=+134.601625920" watchObservedRunningTime="2024-02-08 23:23:47.360555677 +0000 UTC m=+134.603085448" Feb 8 23:23:47.393000 audit[4896]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:47.393000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd7aa81a70 a2=0 a3=7ffd7aa81a5c items=0 ppid=2624 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:47.400000 audit[4896]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:47.400000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd7aa81a70 a2=0 a3=7ffd7aa81a5c items=0 ppid=2624 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:47.416000 audit[4898]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:47.416000 audit[4898]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffe4c172f0 a2=0 a3=7fffe4c172dc items=0 ppid=2624 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:47.422000 audit[4898]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:47.422000 audit[4898]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffe4c172f0 a2=0 a3=7fffe4c172dc items=0 ppid=2624 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:47.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:47.795000 audit[4874]: AVC avc: denied { watch } for pid=4874 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_41.1517773261/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c826,c918 tclass=file permissive=0 Feb 8 23:23:47.795000 audit[4874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000155580 a2=fc6 a3=0 items=0 ppid=4760 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 key=(null) Feb 8 23:23:47.795000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:23:53.439459 systemd[1]: run-containerd-runc-k8s.io-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70-runc.CZ3DiU.mount: Deactivated successfully. Feb 8 23:23:53.485822 systemd[1]: run-containerd-runc-k8s.io-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70-runc.U0EkJY.mount: Deactivated successfully. Feb 8 23:24:05.170360 systemd[1]: run-containerd-runc-k8s.io-8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6-runc.Rw1SdP.mount: Deactivated successfully. Feb 8 23:24:07.617884 systemd[1]: Started sshd@7-10.200.8.38:22-10.200.12.6:39792.service. Feb 8 23:24:07.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.12.6:39792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:07.622997 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 8 23:24:07.623100 kernel: audit: type=1130 audit(1707434647.616:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.12.6:39792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:08.258000 audit[4968]: USER_ACCT pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.259931 sshd[4968]: Accepted publickey for core from 10.200.12.6 port 39792 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:08.278000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.280294 sshd[4968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:08.285811 systemd[1]: Started session-10.scope. Feb 8 23:24:08.286934 systemd-logind[1333]: New session 10 of user core. Feb 8 23:24:08.296761 kernel: audit: type=1101 audit(1707434648.258:1445): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.296850 kernel: audit: type=1103 audit(1707434648.278:1446): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.297820 kernel: audit: type=1006 audit(1707434648.278:1447): pid=4968 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 8 23:24:08.278000 audit[4968]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe87f9df80 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.308460 kernel: audit: type=1300 audit(1707434648.278:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe87f9df80 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:08.330490 kernel: audit: type=1327 audit(1707434648.278:1447): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:08.330556 kernel: audit: type=1105 audit(1707434648.296:1448): pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.296000 audit[4968]: USER_START pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.298000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.365531 kernel: audit: type=1103 audit(1707434648.298:1449): pid=4970 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.796293 sshd[4968]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:08.795000 audit[4968]: USER_END pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.798946 systemd[1]: sshd@7-10.200.8.38:22-10.200.12.6:39792.service: Deactivated successfully. Feb 8 23:24:08.800742 systemd[1]: session-10.scope: Deactivated successfully. Feb 8 23:24:08.801650 systemd-logind[1333]: Session 10 logged out. Waiting for processes to exit. Feb 8 23:24:08.802606 systemd-logind[1333]: Removed session 10. Feb 8 23:24:08.795000 audit[4968]: CRED_DISP pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.833859 kernel: audit: type=1106 audit(1707434648.795:1450): pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.833938 kernel: audit: type=1104 audit(1707434648.795:1451): pid=4968 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:08.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.38:22-10.200.12.6:39792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:11.407201 systemd[1]: run-containerd-runc-k8s.io-4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b-runc.nOUXrU.mount: Deactivated successfully. Feb 8 23:24:11.451311 systemd[1]: run-containerd-runc-k8s.io-c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e-runc.cmZkqg.mount: Deactivated successfully. Feb 8 23:24:11.515121 kubelet[2469]: I0208 23:24:11.515070 2469 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64f8bcddf-d8sld" podStartSLOduration=28.108014478 podCreationTimestamp="2024-02-08 23:23:39 +0000 UTC" firstStartedPulling="2024-02-08 23:23:41.846633369 +0000 UTC m=+129.089163240" lastFinishedPulling="2024-02-08 23:23:46.253645184 +0000 UTC m=+133.496174955" observedRunningTime="2024-02-08 23:23:47.372416207 +0000 UTC m=+134.614945978" watchObservedRunningTime="2024-02-08 23:24:11.515026193 +0000 UTC m=+158.757556064" Feb 8 23:24:11.557000 audit[5021]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:11.557000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd3a465310 a2=0 a3=7ffd3a4652fc items=0 ppid=2624 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:11.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:11.559000 audit[5021]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_register_chain pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:11.559000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffd3a465310 a2=0 a3=7ffd3a4652fc items=0 ppid=2624 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:11.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:11.571000 audit[5023]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:11.571000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff900a4570 a2=0 a3=7fff900a455c items=0 ppid=2624 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:11.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:11.573000 audit[5023]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:11.573000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7fff900a4570 a2=0 a3=7fff900a455c items=0 ppid=2624 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:11.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:13.898591 systemd[1]: Started sshd@8-10.200.8.38:22-10.200.12.6:39796.service. Feb 8 23:24:13.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.12.6:39796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:13.904403 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 8 23:24:13.904552 kernel: audit: type=1130 audit(1707434653.897:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.12.6:39796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:14.536000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.556787 sshd[5025]: Accepted publickey for core from 10.200.12.6 port 39796 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:14.557174 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:14.558058 kernel: audit: type=1101 audit(1707434654.536:1458): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.558135 kernel: audit: type=1103 audit(1707434654.555:1459): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.555000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.562857 systemd[1]: Started session-11.scope. Feb 8 23:24:14.564118 systemd-logind[1333]: New session 11 of user core. Feb 8 23:24:14.584094 kernel: audit: type=1006 audit(1707434654.555:1460): pid=5025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 8 23:24:14.584784 kernel: audit: type=1300 audit(1707434654.555:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe17a30be0 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:14.555000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe17a30be0 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:14.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:14.602456 kernel: audit: type=1327 audit(1707434654.555:1460): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:14.566000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.626112 kernel: audit: type=1105 audit(1707434654.566:1461): pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.626927 kernel: audit: type=1103 audit(1707434654.566:1462): pid=5027 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:14.566000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:15.042128 sshd[5025]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:15.042000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:15.044979 systemd[1]: sshd@8-10.200.8.38:22-10.200.12.6:39796.service: Deactivated successfully. Feb 8 23:24:15.046379 systemd[1]: session-11.scope: Deactivated successfully. Feb 8 23:24:15.050071 systemd-logind[1333]: Session 11 logged out. Waiting for processes to exit. Feb 8 23:24:15.050965 systemd-logind[1333]: Removed session 11. Feb 8 23:24:15.064486 kernel: audit: type=1106 audit(1707434655.042:1463): pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:15.064560 kernel: audit: type=1104 audit(1707434655.042:1464): pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:15.042000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:15.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.38:22-10.200.12.6:39796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:20.173673 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:24:20.173868 kernel: audit: type=1130 audit(1707434660.148:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.12.6:34104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:20.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.12.6:34104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:20.149804 systemd[1]: Started sshd@9-10.200.8.38:22-10.200.12.6:34104.service. Feb 8 23:24:20.765000 audit[5041]: USER_ACCT pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.768610 sshd[5041]: Accepted publickey for core from 10.200.12.6 port 34104 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:20.786000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.788207 sshd[5041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:20.796820 systemd[1]: Started session-12.scope. Feb 8 23:24:20.797816 systemd-logind[1333]: New session 12 of user core. Feb 8 23:24:20.806417 kernel: audit: type=1101 audit(1707434660.765:1467): pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.806504 kernel: audit: type=1103 audit(1707434660.786:1468): pid=5041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.806532 kernel: audit: type=1006 audit(1707434660.786:1469): pid=5041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 8 23:24:20.786000 audit[5041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca584bda0 a2=3 a3=0 items=0 ppid=1 pid=5041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.834586 kernel: audit: type=1300 audit(1707434660.786:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca584bda0 a2=3 a3=0 items=0 ppid=1 pid=5041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:20.802000 audit[5041]: USER_START pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.858919 kernel: audit: type=1327 audit(1707434660.786:1469): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:20.858991 kernel: audit: type=1105 audit(1707434660.802:1470): pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.859027 kernel: audit: type=1103 audit(1707434660.805:1471): pid=5043 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:20.805000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:21.273361 sshd[5041]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:21.273000 audit[5041]: USER_END pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:21.276652 systemd[1]: sshd@9-10.200.8.38:22-10.200.12.6:34104.service: Deactivated successfully. Feb 8 23:24:21.277536 systemd[1]: session-12.scope: Deactivated successfully. Feb 8 23:24:21.279147 systemd-logind[1333]: Session 12 logged out. Waiting for processes to exit. Feb 8 23:24:21.280107 systemd-logind[1333]: Removed session 12. Feb 8 23:24:21.273000 audit[5041]: CRED_DISP pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:21.295452 kernel: audit: type=1106 audit(1707434661.273:1472): pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:21.295512 kernel: audit: type=1104 audit(1707434661.273:1473): pid=5041 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:21.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.38:22-10.200.12.6:34104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:23.438032 systemd[1]: run-containerd-runc-k8s.io-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70-runc.ZKkrjp.mount: Deactivated successfully. Feb 8 23:24:26.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.12.6:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:26.377063 systemd[1]: Started sshd@10-10.200.8.38:22-10.200.12.6:34116.service. Feb 8 23:24:26.382331 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:24:26.382420 kernel: audit: type=1130 audit(1707434666.375:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.12.6:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:26.988000 audit[5082]: USER_ACCT pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:26.989964 sshd[5082]: Accepted publickey for core from 10.200.12.6 port 34116 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:27.009223 kernel: audit: type=1101 audit(1707434666.988:1476): pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.009103 sshd[5082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:27.007000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.021096 systemd[1]: Started session-13.scope. Feb 8 23:24:27.022498 systemd-logind[1333]: New session 13 of user core. Feb 8 23:24:27.029669 kernel: audit: type=1103 audit(1707434667.007:1477): pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.007000 audit[5082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9910910 a2=3 a3=0 items=0 ppid=1 pid=5082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:27.059000 kernel: audit: type=1006 audit(1707434667.007:1478): pid=5082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 8 23:24:27.059101 kernel: audit: type=1300 audit(1707434667.007:1478): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9910910 a2=3 a3=0 items=0 ppid=1 pid=5082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:27.059131 kernel: audit: type=1327 audit(1707434667.007:1478): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:27.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:27.026000 audit[5082]: USER_START pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.084237 kernel: audit: type=1105 audit(1707434667.026:1479): pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.084318 kernel: audit: type=1103 audit(1707434667.028:1480): pid=5084 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.028000 audit[5084]: CRED_ACQ pid=5084 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.498081 sshd[5082]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:27.498000 audit[5082]: USER_END pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.502143 systemd-logind[1333]: Session 13 logged out. Waiting for processes to exit. Feb 8 23:24:27.503761 systemd[1]: sshd@10-10.200.8.38:22-10.200.12.6:34116.service: Deactivated successfully. Feb 8 23:24:27.504767 systemd[1]: session-13.scope: Deactivated successfully. Feb 8 23:24:27.506166 systemd-logind[1333]: Removed session 13. Feb 8 23:24:27.518867 kernel: audit: type=1106 audit(1707434667.498:1481): pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.518962 kernel: audit: type=1104 audit(1707434667.498:1482): pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.498000 audit[5082]: CRED_DISP pid=5082 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:27.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.38:22-10.200.12.6:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:27.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.38:22-10.200.12.6:33402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:27.602523 systemd[1]: Started sshd@11-10.200.8.38:22-10.200.12.6:33402.service. Feb 8 23:24:28.218000 audit[5096]: USER_ACCT pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:28.220609 sshd[5096]: Accepted publickey for core from 10.200.12.6 port 33402 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:28.220000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:28.220000 audit[5096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4df212b0 a2=3 a3=0 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:28.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:28.222262 sshd[5096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:28.227495 systemd-logind[1333]: New session 14 of user core. Feb 8 23:24:28.228086 systemd[1]: Started session-14.scope. Feb 8 23:24:28.231000 audit[5096]: USER_START pid=5096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:28.232000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:28.700000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:28.700000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:28.700000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002aceae0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:28.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:28.700000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023a69c0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:28.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:29.416958 sshd[5096]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:29.417000 audit[5096]: USER_END pid=5096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:29.417000 audit[5096]: CRED_DISP pid=5096 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:29.421017 systemd[1]: sshd@11-10.200.8.38:22-10.200.12.6:33402.service: Deactivated successfully. Feb 8 23:24:29.422221 systemd[1]: session-14.scope: Deactivated successfully. Feb 8 23:24:29.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.38:22-10.200.12.6:33402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:29.423130 systemd-logind[1333]: Session 14 logged out. Waiting for processes to exit. Feb 8 23:24:29.424378 systemd-logind[1333]: Removed session 14. Feb 8 23:24:29.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.38:22-10.200.12.6:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:29.528868 systemd[1]: Started sshd@12-10.200.8.38:22-10.200.12.6:33404.service. Feb 8 23:24:29.611000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.611000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01214b380 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.611000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:29.664000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.664000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.664000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0124a81e0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:29.664000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.664000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c01214b3e0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:29.664000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011f9da10 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:29.729000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.729000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01209d060 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.729000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:29.763000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:29.763000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c01214b620 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:24:29.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:24:30.142000 audit[5106]: USER_ACCT pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.143544 sshd[5106]: Accepted publickey for core from 10.200.12.6 port 33404 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:30.144000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.144000 audit[5106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4763b4a0 a2=3 a3=0 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:30.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:30.145257 sshd[5106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:30.150672 systemd-logind[1333]: New session 15 of user core. Feb 8 23:24:30.151188 systemd[1]: Started session-15.scope. Feb 8 23:24:30.155000 audit[5106]: USER_START pid=5106 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.156000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.635829 sshd[5106]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:30.637000 audit[5106]: USER_END pid=5106 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.637000 audit[5106]: CRED_DISP pid=5106 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:30.639714 systemd[1]: sshd@12-10.200.8.38:22-10.200.12.6:33404.service: Deactivated successfully. Feb 8 23:24:30.640888 systemd[1]: session-15.scope: Deactivated successfully. Feb 8 23:24:30.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.38:22-10.200.12.6:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:30.641942 systemd-logind[1333]: Session 15 logged out. Waiting for processes to exit. Feb 8 23:24:30.642945 systemd-logind[1333]: Removed session 15. Feb 8 23:24:35.741631 systemd[1]: Started sshd@13-10.200.8.38:22-10.200.12.6:33418.service. Feb 8 23:24:35.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.12.6:33418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:35.753885 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 8 23:24:35.753962 kernel: audit: type=1130 audit(1707434675.745:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.12.6:33418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:36.356000 audit[5144]: USER_ACCT pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.376192 sshd[5144]: Accepted publickey for core from 10.200.12.6 port 33418 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:36.376566 kernel: audit: type=1101 audit(1707434676.356:1511): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.376627 sshd[5144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:36.375000 audit[5144]: CRED_ACQ pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.386495 systemd[1]: Started session-16.scope. Feb 8 23:24:36.387921 systemd-logind[1333]: New session 16 of user core. Feb 8 23:24:36.398477 kernel: audit: type=1103 audit(1707434676.375:1512): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.375000 audit[5144]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc11c4abb0 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:36.427760 kernel: audit: type=1006 audit(1707434676.375:1513): pid=5144 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 8 23:24:36.427868 kernel: audit: type=1300 audit(1707434676.375:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc11c4abb0 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:36.427899 kernel: audit: type=1327 audit(1707434676.375:1513): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:36.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:36.393000 audit[5144]: USER_START pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.453189 kernel: audit: type=1105 audit(1707434676.393:1514): pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.453282 kernel: audit: type=1103 audit(1707434676.403:1515): pid=5146 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.403000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.850375 sshd[5144]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:36.851000 audit[5144]: USER_END pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.854120 systemd[1]: sshd@13-10.200.8.38:22-10.200.12.6:33418.service: Deactivated successfully. Feb 8 23:24:36.855075 systemd[1]: session-16.scope: Deactivated successfully. Feb 8 23:24:36.856913 systemd-logind[1333]: Session 16 logged out. Waiting for processes to exit. Feb 8 23:24:36.857940 systemd-logind[1333]: Removed session 16. Feb 8 23:24:36.871471 kernel: audit: type=1106 audit(1707434676.851:1516): pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.851000 audit[5144]: CRED_DISP pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:36.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.38:22-10.200.12.6:33418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:36.889453 kernel: audit: type=1104 audit(1707434676.851:1517): pid=5144 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:41.413165 systemd[1]: run-containerd-runc-k8s.io-4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b-runc.xj2ii3.mount: Deactivated successfully. Feb 8 23:24:41.451298 systemd[1]: run-containerd-runc-k8s.io-c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e-runc.LkoBh3.mount: Deactivated successfully. Feb 8 23:24:41.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.12.6:58044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:41.956970 systemd[1]: Started sshd@14-10.200.8.38:22-10.200.12.6:58044.service. Feb 8 23:24:41.961586 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:24:41.961659 kernel: audit: type=1130 audit(1707434681.956:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.12.6:58044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:42.583000 audit[5206]: USER_ACCT pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.602574 kernel: audit: type=1101 audit(1707434682.583:1520): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.585387 sshd[5206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:42.602980 sshd[5206]: Accepted publickey for core from 10.200.12.6 port 58044 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:42.584000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.608029 systemd[1]: Started session-17.scope. Feb 8 23:24:42.608793 systemd-logind[1333]: New session 17 of user core. Feb 8 23:24:42.620502 kernel: audit: type=1103 audit(1707434682.584:1521): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.620597 kernel: audit: type=1006 audit(1707434682.584:1522): pid=5206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 8 23:24:42.584000 audit[5206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4df902b0 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.648046 kernel: audit: type=1300 audit(1707434682.584:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4df902b0 a2=3 a3=0 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:42.648126 kernel: audit: type=1327 audit(1707434682.584:1522): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:42.584000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:42.654698 kernel: audit: type=1105 audit(1707434682.613:1523): pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.613000 audit[5206]: USER_START pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.613000 audit[5208]: CRED_ACQ pid=5208 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:42.688244 kernel: audit: type=1103 audit(1707434682.613:1524): pid=5208 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:43.094363 sshd[5206]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:43.095000 audit[5206]: USER_END pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:43.102191 systemd[1]: sshd@14-10.200.8.38:22-10.200.12.6:58044.service: Deactivated successfully. Feb 8 23:24:43.103066 systemd[1]: session-17.scope: Deactivated successfully. Feb 8 23:24:43.104286 systemd-logind[1333]: Session 17 logged out. Waiting for processes to exit. Feb 8 23:24:43.105242 systemd-logind[1333]: Removed session 17. Feb 8 23:24:43.117452 kernel: audit: type=1106 audit(1707434683.095:1525): pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:43.117544 kernel: audit: type=1104 audit(1707434683.095:1526): pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:43.095000 audit[5206]: CRED_DISP pid=5206 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:43.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.38:22-10.200.12.6:58044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010d8a40 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010d8a80 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:45.345000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:24:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010d8ac0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:45.345000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0004fdb40 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:24:45.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:24:46.725000 audit[4831]: AVC avc: denied { watch } for pid=4831 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_41.2446437412/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c145 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c145 tclass=file permissive=0 Feb 8 23:24:46.725000 audit[4831]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00186a3c0 a2=fc6 a3=0 items=0 ppid=4718 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c145 key=(null) Feb 8 23:24:46.725000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:24:47.796000 audit[4874]: AVC avc: denied { watch } for pid=4874 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_41.1517773261/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c826,c918 tclass=file permissive=0 Feb 8 23:24:47.801572 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 8 23:24:47.801651 kernel: audit: type=1400 audit(1707434687.796:1533): avc: denied { watch } for pid=4874 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_41.1517773261/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c826,c918 tclass=file permissive=0 Feb 8 23:24:47.796000 audit[4874]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a8140 a2=fc6 a3=0 items=0 ppid=4760 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 key=(null) Feb 8 23:24:47.840735 kernel: audit: type=1300 audit(1707434687.796:1533): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010a8140 a2=fc6 a3=0 items=0 ppid=4760 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c826,c918 key=(null) Feb 8 23:24:47.840835 kernel: audit: type=1327 audit(1707434687.796:1533): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:24:47.796000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:24:48.193880 systemd[1]: Started sshd@15-10.200.8.38:22-10.200.12.6:33480.service. Feb 8 23:24:48.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.12.6:33480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:48.213504 kernel: audit: type=1130 audit(1707434688.194:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.12.6:33480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:48.810000 audit[5220]: USER_ACCT pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.811361 sshd[5220]: Accepted publickey for core from 10.200.12.6 port 33480 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:48.831000 audit[5220]: CRED_ACQ pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.832410 sshd[5220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:48.837993 systemd[1]: Started session-18.scope. Feb 8 23:24:48.838997 systemd-logind[1333]: New session 18 of user core. Feb 8 23:24:48.848237 kernel: audit: type=1101 audit(1707434688.810:1535): pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.848329 kernel: audit: type=1103 audit(1707434688.831:1536): pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.831000 audit[5220]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2c19eaa0 a2=3 a3=0 items=0 ppid=1 pid=5220 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.876596 kernel: audit: type=1006 audit(1707434688.831:1537): pid=5220 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 8 23:24:48.876675 kernel: audit: type=1300 audit(1707434688.831:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2c19eaa0 a2=3 a3=0 items=0 ppid=1 pid=5220 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:48.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:48.883618 kernel: audit: type=1327 audit(1707434688.831:1537): proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:48.849000 audit[5220]: USER_START pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.851000 audit[5222]: CRED_ACQ pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:48.903461 kernel: audit: type=1105 audit(1707434688.849:1538): pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:49.307127 sshd[5220]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:49.308000 audit[5220]: USER_END pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:49.308000 audit[5220]: CRED_DISP pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:49.310300 systemd[1]: sshd@15-10.200.8.38:22-10.200.12.6:33480.service: Deactivated successfully. Feb 8 23:24:49.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.38:22-10.200.12.6:33480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:49.311396 systemd[1]: session-18.scope: Deactivated successfully. Feb 8 23:24:49.312116 systemd-logind[1333]: Session 18 logged out. Waiting for processes to exit. Feb 8 23:24:49.312992 systemd-logind[1333]: Removed session 18. Feb 8 23:24:49.414402 systemd[1]: Started sshd@16-10.200.8.38:22-10.200.12.6:33496.service. Feb 8 23:24:49.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.38:22-10.200.12.6:33496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:50.089000 audit[5231]: USER_ACCT pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.090302 sshd[5231]: Accepted publickey for core from 10.200.12.6 port 33496 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:50.090000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.091000 audit[5231]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68ccb010 a2=3 a3=0 items=0 ppid=1 pid=5231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:50.091000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:50.091829 sshd[5231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:50.097078 systemd[1]: Started session-19.scope. Feb 8 23:24:50.097557 systemd-logind[1333]: New session 19 of user core. Feb 8 23:24:50.101000 audit[5231]: USER_START pid=5231 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.103000 audit[5233]: CRED_ACQ pid=5233 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.655860 sshd[5231]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:50.657000 audit[5231]: USER_END pid=5231 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.657000 audit[5231]: CRED_DISP pid=5231 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:50.659610 systemd[1]: sshd@16-10.200.8.38:22-10.200.12.6:33496.service: Deactivated successfully. Feb 8 23:24:50.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.38:22-10.200.12.6:33496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:50.660834 systemd[1]: session-19.scope: Deactivated successfully. Feb 8 23:24:50.661587 systemd-logind[1333]: Session 19 logged out. Waiting for processes to exit. Feb 8 23:24:50.662351 systemd-logind[1333]: Removed session 19. Feb 8 23:24:50.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.38:22-10.200.12.6:33510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:50.774337 systemd[1]: Started sshd@17-10.200.8.38:22-10.200.12.6:33510.service. Feb 8 23:24:51.389000 audit[5240]: USER_ACCT pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:51.390771 sshd[5240]: Accepted publickey for core from 10.200.12.6 port 33510 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:51.392000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:51.392000 audit[5240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73e1e290 a2=3 a3=0 items=0 ppid=1 pid=5240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:51.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:51.393165 sshd[5240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:51.398757 systemd-logind[1333]: New session 20 of user core. Feb 8 23:24:51.399594 systemd[1]: Started session-20.scope. Feb 8 23:24:51.404000 audit[5240]: USER_START pid=5240 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:51.405000 audit[5242]: CRED_ACQ pid=5242 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:52.836503 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 8 23:24:52.836801 kernel: audit: type=1325 audit(1707434692.825:1558): table=filter:131 family=2 entries=20 op=nft_register_rule pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.825000 audit[5253]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.825000 audit[5253]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff4f339f60 a2=0 a3=7fff4f339f4c items=0 ppid=2624 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.861656 kernel: audit: type=1300 audit(1707434692.825:1558): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff4f339f60 a2=0 a3=7fff4f339f4c items=0 ppid=2624 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.873577 kernel: audit: type=1327 audit(1707434692.825:1558): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.861000 audit[5253]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.885510 kernel: audit: type=1325 audit(1707434692.861:1559): table=nat:132 family=2 entries=22 op=nft_register_rule pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.861000 audit[5253]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff4f339f60 a2=0 a3=31030 items=0 ppid=2624 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.907649 kernel: audit: type=1300 audit(1707434692.861:1559): arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff4f339f60 a2=0 a3=31030 items=0 ppid=2624 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.921792 kernel: audit: type=1327 audit(1707434692.861:1559): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.920215 sshd[5240]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:52.913000 audit[5255]: NETFILTER_CFG table=filter:133 family=2 entries=32 op=nft_register_rule pid=5255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.923973 systemd[1]: sshd@17-10.200.8.38:22-10.200.12.6:33510.service: Deactivated successfully. Feb 8 23:24:52.925329 systemd[1]: session-20.scope: Deactivated successfully. Feb 8 23:24:52.933593 systemd-logind[1333]: Session 20 logged out. Waiting for processes to exit. Feb 8 23:24:52.934465 kernel: audit: type=1325 audit(1707434692.913:1560): table=filter:133 family=2 entries=32 op=nft_register_rule pid=5255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.934530 kernel: audit: type=1300 audit(1707434692.913:1560): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc0628f2e0 a2=0 a3=7ffc0628f2cc items=0 ppid=2624 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.913000 audit[5255]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc0628f2e0 a2=0 a3=7ffc0628f2cc items=0 ppid=2624 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.935055 systemd-logind[1333]: Removed session 20. Feb 8 23:24:52.955541 kernel: audit: type=1327 audit(1707434692.913:1560): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:52.922000 audit[5240]: USER_END pid=5240 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:52.984171 kernel: audit: type=1106 audit(1707434692.922:1561): pid=5240 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:52.922000 audit[5240]: CRED_DISP pid=5240 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:52.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.38:22-10.200.12.6:33510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:52.928000 audit[5255]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:52.928000 audit[5255]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc0628f2e0 a2=0 a3=31030 items=0 ppid=2624 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:52.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:53.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.38:22-10.200.12.6:33520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:53.019491 systemd[1]: Started sshd@18-10.200.8.38:22-10.200.12.6:33520.service. Feb 8 23:24:53.478803 systemd[1]: run-containerd-runc-k8s.io-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70-runc.0tZxQ1.mount: Deactivated successfully. Feb 8 23:24:53.645000 audit[5258]: USER_ACCT pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:53.646086 sshd[5258]: Accepted publickey for core from 10.200.12.6 port 33520 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:53.647000 audit[5258]: CRED_ACQ pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:53.647000 audit[5258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbde4e6d0 a2=3 a3=0 items=0 ppid=1 pid=5258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:53.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:53.647943 sshd[5258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:53.653292 systemd[1]: Started session-21.scope. Feb 8 23:24:53.653899 systemd-logind[1333]: New session 21 of user core. Feb 8 23:24:53.660000 audit[5258]: USER_START pid=5258 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:53.662000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:54.354877 sshd[5258]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:54.356000 audit[5258]: USER_END pid=5258 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:54.356000 audit[5258]: CRED_DISP pid=5258 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:54.358543 systemd[1]: sshd@18-10.200.8.38:22-10.200.12.6:33520.service: Deactivated successfully. Feb 8 23:24:54.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.38:22-10.200.12.6:33520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:54.359772 systemd[1]: session-21.scope: Deactivated successfully. Feb 8 23:24:54.360779 systemd-logind[1333]: Session 21 logged out. Waiting for processes to exit. Feb 8 23:24:54.361818 systemd-logind[1333]: Removed session 21. Feb 8 23:24:54.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.38:22-10.200.12.6:33530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:54.459345 systemd[1]: Started sshd@19-10.200.8.38:22-10.200.12.6:33530.service. Feb 8 23:24:55.117000 audit[5307]: USER_ACCT pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.118227 sshd[5307]: Accepted publickey for core from 10.200.12.6 port 33530 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:24:55.118000 audit[5307]: CRED_ACQ pid=5307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.119000 audit[5307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6ed29c50 a2=3 a3=0 items=0 ppid=1 pid=5307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:55.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:24:55.119878 sshd[5307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:24:55.125195 systemd[1]: Started session-22.scope. Feb 8 23:24:55.125687 systemd-logind[1333]: New session 22 of user core. Feb 8 23:24:55.129000 audit[5307]: USER_START pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.131000 audit[5309]: CRED_ACQ pid=5309 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.605099 sshd[5307]: pam_unix(sshd:session): session closed for user core Feb 8 23:24:55.606000 audit[5307]: USER_END pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.606000 audit[5307]: CRED_DISP pid=5307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:24:55.609030 systemd[1]: sshd@19-10.200.8.38:22-10.200.12.6:33530.service: Deactivated successfully. Feb 8 23:24:55.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.38:22-10.200.12.6:33530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:24:55.610075 systemd[1]: session-22.scope: Deactivated successfully. Feb 8 23:24:55.610797 systemd-logind[1333]: Session 22 logged out. Waiting for processes to exit. Feb 8 23:24:55.611676 systemd-logind[1333]: Removed session 22. Feb 8 23:24:59.998471 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 8 23:24:59.998640 kernel: audit: type=1325 audit(1707434699.992:1583): table=filter:135 family=2 entries=20 op=nft_register_rule pid=5319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:59.992000 audit[5319]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:59.992000 audit[5319]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe251e6c50 a2=0 a3=7ffe251e6c3c items=0 ppid=2624 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:00.044568 kernel: audit: type=1300 audit(1707434699.992:1583): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe251e6c50 a2=0 a3=7ffe251e6c3c items=0 ppid=2624 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:59.992000 audit[5319]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:25:00.068823 kernel: audit: type=1327 audit(1707434699.992:1583): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:25:00.068948 kernel: audit: type=1325 audit(1707434699.992:1584): table=nat:136 family=2 entries=106 op=nft_register_chain pid=5319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:25:00.068979 kernel: audit: type=1300 audit(1707434699.992:1584): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffe251e6c50 a2=0 a3=7ffe251e6c3c items=0 ppid=2624 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.992000 audit[5319]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffe251e6c50 a2=0 a3=7ffe251e6c3c items=0 ppid=2624 pid=5319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:59.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:25:00.098857 kernel: audit: type=1327 audit(1707434699.992:1584): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:25:00.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.38:22-10.200.12.6:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:00.712086 systemd[1]: Started sshd@20-10.200.8.38:22-10.200.12.6:49714.service. Feb 8 23:25:00.731468 kernel: audit: type=1130 audit(1707434700.711:1585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.38:22-10.200.12.6:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:01.330000 audit[5322]: USER_ACCT pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.330979 sshd[5322]: Accepted publickey for core from 10.200.12.6 port 49714 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:01.349000 audit[5322]: CRED_ACQ pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.350776 sshd[5322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:01.356727 systemd[1]: Started session-23.scope. Feb 8 23:25:01.357855 systemd-logind[1333]: New session 23 of user core. Feb 8 23:25:01.367684 kernel: audit: type=1101 audit(1707434701.330:1586): pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.367776 kernel: audit: type=1103 audit(1707434701.349:1587): pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.378372 kernel: audit: type=1006 audit(1707434701.349:1588): pid=5322 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 8 23:25:01.349000 audit[5322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe936b48e0 a2=3 a3=0 items=0 ppid=1 pid=5322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:01.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:01.363000 audit[5322]: USER_START pid=5322 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.365000 audit[5324]: CRED_ACQ pid=5324 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.827536 sshd[5322]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:01.828000 audit[5322]: USER_END pid=5322 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.829000 audit[5322]: CRED_DISP pid=5322 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:01.831145 systemd-logind[1333]: Session 23 logged out. Waiting for processes to exit. Feb 8 23:25:01.831363 systemd[1]: sshd@20-10.200.8.38:22-10.200.12.6:49714.service: Deactivated successfully. Feb 8 23:25:01.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.38:22-10.200.12.6:49714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:01.832488 systemd[1]: session-23.scope: Deactivated successfully. Feb 8 23:25:01.833325 systemd-logind[1333]: Removed session 23. Feb 8 23:25:05.159128 systemd[1]: run-containerd-runc-k8s.io-8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6-runc.q8H4dO.mount: Deactivated successfully. Feb 8 23:25:06.933296 systemd[1]: Started sshd@21-10.200.8.38:22-10.200.12.6:49728.service. Feb 8 23:25:06.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.12.6:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:06.938789 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 8 23:25:06.938887 kernel: audit: type=1130 audit(1707434706.933:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.12.6:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:07.549000 audit[5360]: USER_ACCT pid=5360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.551884 sshd[5360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:07.570591 kernel: audit: type=1101 audit(1707434707.549:1595): pid=5360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.570650 sshd[5360]: Accepted publickey for core from 10.200.12.6 port 49728 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:07.576965 systemd[1]: Started session-24.scope. Feb 8 23:25:07.577330 systemd-logind[1333]: New session 24 of user core. Feb 8 23:25:07.551000 audit[5360]: CRED_ACQ pid=5360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.610093 kernel: audit: type=1103 audit(1707434707.551:1596): pid=5360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.610193 kernel: audit: type=1006 audit(1707434707.551:1597): pid=5360 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 8 23:25:07.610222 kernel: audit: type=1300 audit(1707434707.551:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2bfb3680 a2=3 a3=0 items=0 ppid=1 pid=5360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:07.551000 audit[5360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2bfb3680 a2=3 a3=0 items=0 ppid=1 pid=5360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:07.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:07.633944 kernel: audit: type=1327 audit(1707434707.551:1597): proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:07.634016 kernel: audit: type=1105 audit(1707434707.592:1598): pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.592000 audit[5360]: USER_START pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.592000 audit[5365]: CRED_ACQ pid=5365 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:07.658452 kernel: audit: type=1103 audit(1707434707.592:1599): pid=5365 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:08.049310 sshd[5360]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:08.050000 audit[5360]: USER_END pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:08.052947 systemd[1]: sshd@21-10.200.8.38:22-10.200.12.6:49728.service: Deactivated successfully. Feb 8 23:25:08.053832 systemd[1]: session-24.scope: Deactivated successfully. Feb 8 23:25:08.055423 systemd-logind[1333]: Session 24 logged out. Waiting for processes to exit. Feb 8 23:25:08.056406 systemd-logind[1333]: Removed session 24. Feb 8 23:25:08.050000 audit[5360]: CRED_DISP pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:08.070459 kernel: audit: type=1106 audit(1707434708.050:1600): pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:08.070513 kernel: audit: type=1104 audit(1707434708.050:1601): pid=5360 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:08.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.38:22-10.200.12.6:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:11.406825 systemd[1]: run-containerd-runc-k8s.io-4ad74936af5c8b689ff4cc0d42382e2930a658f35509d964f581567d7c9b7f2b-runc.UnIK6W.mount: Deactivated successfully. Feb 8 23:25:11.435358 systemd[1]: run-containerd-runc-k8s.io-c2ef3d46bf580cb7b639b42f26f2a786516708ae01486b2bc3ddc3c293ac506e-runc.2yjzRR.mount: Deactivated successfully. Feb 8 23:25:13.156669 systemd[1]: Started sshd@22-10.200.8.38:22-10.200.12.6:57646.service. Feb 8 23:25:13.180572 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:25:13.180693 kernel: audit: type=1130 audit(1707434713.155:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.12.6:57646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:13.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.12.6:57646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:13.774000 audit[5416]: USER_ACCT pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.795310 kernel: audit: type=1101 audit(1707434713.774:1604): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.795420 kernel: audit: type=1103 audit(1707434713.793:1605): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.793000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.795135 sshd[5416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:13.795795 sshd[5416]: Accepted publickey for core from 10.200.12.6 port 57646 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:13.815789 kernel: audit: type=1006 audit(1707434713.793:1606): pid=5416 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 8 23:25:13.813312 systemd[1]: Started session-25.scope. Feb 8 23:25:13.816867 systemd-logind[1333]: New session 25 of user core. Feb 8 23:25:13.793000 audit[5416]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2da88ff0 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:13.846137 kernel: audit: type=1300 audit(1707434713.793:1606): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2da88ff0 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:13.846811 kernel: audit: type=1327 audit(1707434713.793:1606): proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:13.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:13.818000 audit[5416]: USER_START pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.871402 kernel: audit: type=1105 audit(1707434713.818:1607): pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.818000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:13.872454 kernel: audit: type=1103 audit(1707434713.818:1608): pid=5418 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:14.281518 sshd[5416]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:14.282000 audit[5416]: USER_END pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:14.285658 systemd-logind[1333]: Session 25 logged out. Waiting for processes to exit. Feb 8 23:25:14.287272 systemd[1]: sshd@22-10.200.8.38:22-10.200.12.6:57646.service: Deactivated successfully. Feb 8 23:25:14.288292 systemd[1]: session-25.scope: Deactivated successfully. Feb 8 23:25:14.289961 systemd-logind[1333]: Removed session 25. Feb 8 23:25:14.282000 audit[5416]: CRED_DISP pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:14.305443 kernel: audit: type=1106 audit(1707434714.282:1609): pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:14.305495 kernel: audit: type=1104 audit(1707434714.282:1610): pid=5416 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:14.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.38:22-10.200.12.6:57646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:19.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.12.6:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:19.388990 systemd[1]: Started sshd@23-10.200.8.38:22-10.200.12.6:39034.service. Feb 8 23:25:19.394422 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:25:19.394502 kernel: audit: type=1130 audit(1707434719.387:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.12.6:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:20.011000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.032617 kernel: audit: type=1101 audit(1707434720.011:1613): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.032679 sshd[5430]: Accepted publickey for core from 10.200.12.6 port 39034 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:20.033020 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:20.031000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.040825 systemd-logind[1333]: New session 26 of user core. Feb 8 23:25:20.041664 systemd[1]: Started session-26.scope. Feb 8 23:25:20.052472 kernel: audit: type=1103 audit(1707434720.031:1614): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.052555 kernel: audit: type=1006 audit(1707434720.031:1615): pid=5430 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 8 23:25:20.031000 audit[5430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2631be00 a2=3 a3=0 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:20.063466 kernel: audit: type=1300 audit(1707434720.031:1615): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2631be00 a2=3 a3=0 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:20.031000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:20.087949 kernel: audit: type=1327 audit(1707434720.031:1615): proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:20.088050 kernel: audit: type=1105 audit(1707434720.048:1616): pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.048000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.050000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.123484 kernel: audit: type=1103 audit(1707434720.050:1617): pid=5432 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.546651 sshd[5430]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:20.546000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.551993 systemd[1]: sshd@23-10.200.8.38:22-10.200.12.6:39034.service: Deactivated successfully. Feb 8 23:25:20.552897 systemd[1]: session-26.scope: Deactivated successfully. Feb 8 23:25:20.566112 systemd-logind[1333]: Session 26 logged out. Waiting for processes to exit. Feb 8 23:25:20.567324 systemd-logind[1333]: Removed session 26. Feb 8 23:25:20.546000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.584838 kernel: audit: type=1106 audit(1707434720.546:1618): pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.584925 kernel: audit: type=1104 audit(1707434720.546:1619): pid=5430 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:20.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.38:22-10.200.12.6:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:23.434188 systemd[1]: run-containerd-runc-k8s.io-b38a7cce070b7a6c2a0db634308f9697168802c67b4a40e4c0e34eb6b8468d70-runc.AgkAOv.mount: Deactivated successfully. Feb 8 23:25:25.651595 systemd[1]: Started sshd@24-10.200.8.38:22-10.200.12.6:39046.service. Feb 8 23:25:25.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.12.6:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:25.657184 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 8 23:25:25.657286 kernel: audit: type=1130 audit(1707434725.650:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.12.6:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:26.265000 audit[5463]: USER_ACCT pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.286964 sshd[5463]: Accepted publickey for core from 10.200.12.6 port 39046 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:26.287118 sshd[5463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:26.287814 kernel: audit: type=1101 audit(1707434726.265:1622): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.285000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.293009 systemd-logind[1333]: New session 27 of user core. Feb 8 23:25:26.293885 systemd[1]: Started session-27.scope. Feb 8 23:25:26.308452 kernel: audit: type=1103 audit(1707434726.285:1623): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.308520 kernel: audit: type=1006 audit(1707434726.285:1624): pid=5463 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 8 23:25:26.285000 audit[5463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeedd72330 a2=3 a3=0 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.336154 kernel: audit: type=1300 audit(1707434726.285:1624): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeedd72330 a2=3 a3=0 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:26.336446 kernel: audit: type=1327 audit(1707434726.285:1624): proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:26.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:26.297000 audit[5463]: USER_START pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.342448 kernel: audit: type=1105 audit(1707434726.297:1625): pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.300000 audit[5465]: CRED_ACQ pid=5465 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.375792 kernel: audit: type=1103 audit(1707434726.300:1626): pid=5465 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.762940 sshd[5463]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:26.763000 audit[5463]: USER_END pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.766411 systemd-logind[1333]: Session 27 logged out. Waiting for processes to exit. Feb 8 23:25:26.768027 systemd[1]: sshd@24-10.200.8.38:22-10.200.12.6:39046.service: Deactivated successfully. Feb 8 23:25:26.768883 systemd[1]: session-27.scope: Deactivated successfully. Feb 8 23:25:26.770597 systemd-logind[1333]: Removed session 27. Feb 8 23:25:26.783516 kernel: audit: type=1106 audit(1707434726.763:1627): pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.783609 kernel: audit: type=1104 audit(1707434726.763:1628): pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.763000 audit[5463]: CRED_DISP pid=5463 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:26.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.38:22-10.200.12.6:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:28.701000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:28.701000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b64d60 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:25:28.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:25:28.701000 audit[2317]: AVC avc: denied { watch } for pid=2317 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:28.701000 audit[2317]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002073bf0 a2=fc6 a3=0 items=0 ppid=2158 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c860 key=(null) Feb 8 23:25:28.701000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 8 23:25:29.611000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.611000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0084ff4d0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.611000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:29.663000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.663000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.663000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0084ff590 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:29.663000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008865e60 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:29.665000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.665000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008700450 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:29.730000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.730000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c004869bc0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.730000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:29.764000 audit[2335]: AVC avc: denied { watch } for pid=2335 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 8 23:25:29.764000 audit[2335]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0084ff7a0 a2=fc6 a3=0 items=0 ppid=2181 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c838 key=(null) Feb 8 23:25:29.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 8 23:25:31.869512 systemd[1]: Started sshd@25-10.200.8.38:22-10.200.12.6:42626.service. Feb 8 23:25:31.884799 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 8 23:25:31.884907 kernel: audit: type=1130 audit(1707434731.868:1638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.12.6:42626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:31.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.12.6:42626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:32.488000 audit[5479]: USER_ACCT pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.509317 sshd[5479]: Accepted publickey for core from 10.200.12.6 port 42626 ssh2: RSA SHA256:psGCIvVnZRuLQEqgvEvjwWELTdsMBZYKF2FBCpe1wIc Feb 8 23:25:32.509711 kernel: audit: type=1101 audit(1707434732.488:1639): pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.509398 sshd[5479]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:25:32.489000 audit[5479]: CRED_ACQ pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.515879 systemd[1]: Started session-28.scope. Feb 8 23:25:32.517053 systemd-logind[1333]: New session 28 of user core. Feb 8 23:25:32.537437 kernel: audit: type=1103 audit(1707434732.489:1640): pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.537520 kernel: audit: type=1006 audit(1707434732.489:1641): pid=5479 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 8 23:25:32.537546 kernel: audit: type=1300 audit(1707434732.489:1641): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7da85d60 a2=3 a3=0 items=0 ppid=1 pid=5479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:32.489000 audit[5479]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7da85d60 a2=3 a3=0 items=0 ppid=1 pid=5479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:25:32.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:32.520000 audit[5479]: USER_START pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.586142 kernel: audit: type=1327 audit(1707434732.489:1641): proctitle=737368643A20636F7265205B707269765D Feb 8 23:25:32.586221 kernel: audit: type=1105 audit(1707434732.520:1642): pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.586248 kernel: audit: type=1103 audit(1707434732.523:1643): pid=5481 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.523000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.992047 sshd[5479]: pam_unix(sshd:session): session closed for user core Feb 8 23:25:32.991000 audit[5479]: USER_END pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.996750 systemd-logind[1333]: Session 28 logged out. Waiting for processes to exit. Feb 8 23:25:32.998522 systemd[1]: sshd@25-10.200.8.38:22-10.200.12.6:42626.service: Deactivated successfully. Feb 8 23:25:32.999541 systemd[1]: session-28.scope: Deactivated successfully. Feb 8 23:25:33.001179 systemd-logind[1333]: Removed session 28. Feb 8 23:25:33.016452 kernel: audit: type=1106 audit(1707434732.991:1644): pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:33.016529 kernel: audit: type=1104 audit(1707434732.992:1645): pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.992000 audit[5479]: CRED_DISP pid=5479 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 8 23:25:32.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.38:22-10.200.12.6:42626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:25:35.162538 systemd[1]: run-containerd-runc-k8s.io-8c543132b0dcaaa04f15e5e725b2b0325b1603af7f4caff9ee33666551ef47e6-runc.v9rQ48.mount: Deactivated successfully. Feb 8 23:25:37.997262 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:37.997689 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.013577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.013894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.041024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.041342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.060959 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.061287 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.085522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.085916 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.109811 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.110124 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.122889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.123153 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.135490 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.135767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.147766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.147989 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.160202 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.160445 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.174091 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.174313 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.185974 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.186179 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.197672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.197885 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.209929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.210137 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.221443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.221631 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.239394 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.239610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.239763 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.250687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.256713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.256909 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.267847 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.268042 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.280517 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.280728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.292444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.292664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.303673 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.303879 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.314805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.314999 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.326044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.326236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.337038 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.337231 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.348869 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.349069 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.359839 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.360029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.370891 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.371120 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.390830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.391055 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.391197 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.402072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.402309 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.407797 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.419475 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.419664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.430577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.430766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.447041 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.447252 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.447402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.452512 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.463774 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.463992 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.480828 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.491923 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.492057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.492167 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.503623 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.503805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.513447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.513674 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.521913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.522117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.532801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.532999 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.543696 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.543890 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.554892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.555173 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.566068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.566281 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.582354 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.582850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.588978 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.589264 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.600266 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.600484 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.611784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.612018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.631421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.631702 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.631838 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.637351 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.649958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.650206 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.664667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.675851 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.675984 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.676094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.686439 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.686667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.692881 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.693092 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.698620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.708961 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.715900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.716186 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.737972 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.760275 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.760505 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.760640 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.760765 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.760889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.761016 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.765849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.777880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.778150 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.788459 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.788708 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.799607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.799849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.810727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.810948 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.821684 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.821903 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.833114 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.833345 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.845729 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.845983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.856787 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.856994 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.867485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.867692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.878559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.878772 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.889565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.889775 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.906132 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.928587 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.928779 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.928914 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.929049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.929190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.929322 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.934010 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.941981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.952452 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.952706 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.962556 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.975460 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.975730 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.975877 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.980869 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.991745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:38.991983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.002695 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.002943 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.014353 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.014594 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.030650 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.030904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.031059 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.036261 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.047830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.048055 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.058687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.058895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.069582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.069803 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.082880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.083123 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.093916 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.094118 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.104812 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.105039 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.115524 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.115738 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.132248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.132639 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.132787 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.138118 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.149025 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.149238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.160454 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.160656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.171754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.171955 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.202771 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.203145 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.203287 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.208740 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.225381 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.225707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.225864 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.236589 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.236891 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.242314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.253466 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.253695 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.267254 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.267515 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.276599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.276848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.287797 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.288035 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.299129 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 8 23:25:39.299364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#223 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001