Feb 9 19:02:52.052414 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:02:52.052439 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:02:52.052455 kernel: BIOS-provided physical RAM map: Feb 9 19:02:52.052463 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:02:52.052468 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 9 19:02:52.052473 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 9 19:02:52.052482 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 9 19:02:52.052488 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 9 19:02:52.052493 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 9 19:02:52.052499 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 9 19:02:52.052516 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 9 19:02:52.052528 kernel: printk: bootconsole [earlyser0] enabled Feb 9 19:02:52.052537 kernel: NX (Execute Disable) protection: active Feb 9 19:02:52.052545 kernel: efi: EFI v2.70 by Microsoft Feb 9 19:02:52.052560 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 9 19:02:52.066546 kernel: random: crng init done Feb 9 19:02:52.066568 kernel: SMBIOS 3.1.0 present. Feb 9 19:02:52.066581 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 19:02:52.066593 kernel: Hypervisor detected: Microsoft Hyper-V Feb 9 19:02:52.066604 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 9 19:02:52.066616 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 9 19:02:52.066627 kernel: Hyper-V: Nested features: 0x1e0101 Feb 9 19:02:52.066644 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 9 19:02:52.066656 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 9 19:02:52.066667 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 9 19:02:52.066679 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 9 19:02:52.066691 kernel: tsc: Detected 2593.907 MHz processor Feb 9 19:02:52.066703 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:02:52.066716 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:02:52.066727 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 9 19:02:52.066739 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:02:52.066751 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 9 19:02:52.066765 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 9 19:02:52.066777 kernel: Using GB pages for direct mapping Feb 9 19:02:52.066788 kernel: Secure boot disabled Feb 9 19:02:52.066800 kernel: ACPI: Early table checksum verification disabled Feb 9 19:02:52.066811 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 9 19:02:52.066823 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066834 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066847 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 19:02:52.066866 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 9 19:02:52.066877 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066890 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066902 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066914 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066927 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066941 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066954 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:02:52.066967 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 9 19:02:52.066982 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 9 19:02:52.067002 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 9 19:02:52.067023 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 9 19:02:52.067035 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 9 19:02:52.067046 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 9 19:02:52.067063 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 9 19:02:52.067075 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 9 19:02:52.067087 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 9 19:02:52.067099 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 9 19:02:52.067110 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:02:52.067121 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:02:52.067132 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 9 19:02:52.067144 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 9 19:02:52.067155 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 9 19:02:52.067168 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 9 19:02:52.067180 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 9 19:02:52.067192 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 9 19:02:52.067202 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 9 19:02:52.067212 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 9 19:02:52.067231 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 9 19:02:52.067242 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 9 19:02:52.067253 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 9 19:02:52.067262 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 9 19:02:52.067276 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 9 19:02:52.067288 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 9 19:02:52.067299 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 9 19:02:52.067310 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 9 19:02:52.067321 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 9 19:02:52.067332 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 9 19:02:52.067344 kernel: Zone ranges: Feb 9 19:02:52.067356 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:02:52.067368 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:02:52.067383 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:02:52.067393 kernel: Movable zone start for each node Feb 9 19:02:52.067406 kernel: Early memory node ranges Feb 9 19:02:52.067419 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:02:52.067432 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 9 19:02:52.067444 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 9 19:02:52.067457 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:02:52.067469 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 9 19:02:52.067482 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:02:52.067497 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:02:52.067526 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 9 19:02:52.067539 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 9 19:02:52.067552 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 9 19:02:52.067564 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:02:52.067577 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:02:52.067590 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:02:52.067603 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 9 19:02:52.067615 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:02:52.067631 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 9 19:02:52.067644 kernel: Booting paravirtualized kernel on Hyper-V Feb 9 19:02:52.067657 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:02:52.067669 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:02:52.067682 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:02:52.067694 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:02:52.067707 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:02:52.067719 kernel: Hyper-V: PV spinlocks enabled Feb 9 19:02:52.067732 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:02:52.067747 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 9 19:02:52.067760 kernel: Policy zone: Normal Feb 9 19:02:52.067776 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:02:52.067789 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:02:52.067802 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:02:52.067815 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:02:52.067827 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:02:52.067841 kernel: Memory: 8081144K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306056K reserved, 0K cma-reserved) Feb 9 19:02:52.067856 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:02:52.067870 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:02:52.067892 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:02:52.067907 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:02:52.067920 kernel: rcu: RCU event tracing is enabled. Feb 9 19:02:52.067932 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:02:52.067945 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:02:52.067959 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:02:52.067972 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:02:52.067985 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:02:52.067999 kernel: Using NULL legacy PIC Feb 9 19:02:52.068015 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 9 19:02:52.068028 kernel: Console: colour dummy device 80x25 Feb 9 19:02:52.068041 kernel: printk: console [tty1] enabled Feb 9 19:02:52.068054 kernel: printk: console [ttyS0] enabled Feb 9 19:02:52.068067 kernel: printk: bootconsole [earlyser0] disabled Feb 9 19:02:52.068081 kernel: ACPI: Core revision 20210730 Feb 9 19:02:52.068097 kernel: Failed to register legacy timer interrupt Feb 9 19:02:52.068109 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:02:52.068122 kernel: Hyper-V: Using IPI hypercalls Feb 9 19:02:52.068135 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Feb 9 19:02:52.068147 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:02:52.068160 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:02:52.068173 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:02:52.068184 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:02:52.068196 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:02:52.068212 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:02:52.068224 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 19:02:52.068236 kernel: RETBleed: Vulnerable Feb 9 19:02:52.068249 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:02:52.068261 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:02:52.068273 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:02:52.068286 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:02:52.068298 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:02:52.068310 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:02:52.068322 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:02:52.068337 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 19:02:52.068349 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 19:02:52.068361 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 19:02:52.068374 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:02:52.068386 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 9 19:02:52.068397 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 9 19:02:52.068410 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 9 19:02:52.068422 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 9 19:02:52.068434 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:02:52.068447 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:02:52.068459 kernel: LSM: Security Framework initializing Feb 9 19:02:52.068471 kernel: SELinux: Initializing. Feb 9 19:02:52.068485 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:02:52.068498 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:02:52.068518 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 19:02:52.068531 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 19:02:52.068544 kernel: signal: max sigframe size: 3632 Feb 9 19:02:52.068556 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:02:52.068569 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:02:52.068582 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:02:52.068594 kernel: x86: Booting SMP configuration: Feb 9 19:02:52.068607 kernel: .... node #0, CPUs: #1 Feb 9 19:02:52.068623 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 9 19:02:52.068636 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:02:52.068648 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:02:52.068661 kernel: smpboot: Max logical packages: 1 Feb 9 19:02:52.068674 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 9 19:02:52.068686 kernel: devtmpfs: initialized Feb 9 19:02:52.068699 kernel: x86/mm: Memory block size: 128MB Feb 9 19:02:52.068711 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 9 19:02:52.068726 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:02:52.068739 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:02:52.068752 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:02:52.068764 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:02:52.068777 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:02:52.068790 kernel: audit: type=2000 audit(1707505371.025:1): state=initialized audit_enabled=0 res=1 Feb 9 19:02:52.068802 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:02:52.068813 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:02:52.068825 kernel: cpuidle: using governor menu Feb 9 19:02:52.068841 kernel: ACPI: bus type PCI registered Feb 9 19:02:52.068853 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:02:52.068866 kernel: dca service started, version 1.12.1 Feb 9 19:02:52.068878 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:02:52.068905 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:02:52.068917 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:02:52.068930 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:02:52.068943 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:02:52.068958 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:02:52.068974 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:02:52.068986 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:02:52.068997 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:02:52.069008 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:02:52.069021 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:02:52.069034 kernel: ACPI: Interpreter enabled Feb 9 19:02:52.069047 kernel: ACPI: PM: (supports S0 S5) Feb 9 19:02:52.069060 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:02:52.069074 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:02:52.069090 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 9 19:02:52.069103 kernel: iommu: Default domain type: Translated Feb 9 19:02:52.069117 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:02:52.069130 kernel: vgaarb: loaded Feb 9 19:02:52.069144 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:02:52.069158 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:02:52.069171 kernel: PTP clock support registered Feb 9 19:02:52.069185 kernel: Registered efivars operations Feb 9 19:02:52.069198 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:02:52.069211 kernel: PCI: System does not support PCI Feb 9 19:02:52.069227 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 9 19:02:52.069240 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:02:52.069254 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:02:52.069267 kernel: pnp: PnP ACPI init Feb 9 19:02:52.069281 kernel: pnp: PnP ACPI: found 3 devices Feb 9 19:02:52.069294 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:02:52.069307 kernel: NET: Registered PF_INET protocol family Feb 9 19:02:52.069320 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:02:52.069337 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:02:52.069350 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:02:52.069364 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:02:52.069377 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:02:52.069390 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:02:52.069403 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:02:52.069415 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:02:52.069427 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:02:52.069440 kernel: NET: Registered PF_XDP protocol family Feb 9 19:02:52.069455 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:02:52.069468 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:02:52.069481 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 9 19:02:52.069494 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:02:52.069525 kernel: Initialise system trusted keyrings Feb 9 19:02:52.069537 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:02:52.069549 kernel: Key type asymmetric registered Feb 9 19:02:52.069562 kernel: Asymmetric key parser 'x509' registered Feb 9 19:02:52.069574 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:02:52.069589 kernel: io scheduler mq-deadline registered Feb 9 19:02:52.069602 kernel: io scheduler kyber registered Feb 9 19:02:52.069615 kernel: io scheduler bfq registered Feb 9 19:02:52.069627 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:02:52.069640 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:02:52.069653 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:02:52.069666 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:02:52.069678 kernel: i8042: PNP: No PS/2 controller found. Feb 9 19:02:52.069866 kernel: rtc_cmos 00:02: registered as rtc0 Feb 9 19:02:52.069973 kernel: rtc_cmos 00:02: setting system clock to 2024-02-09T19:02:51 UTC (1707505371) Feb 9 19:02:52.070070 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 9 19:02:52.070086 kernel: fail to initialize ptp_kvm Feb 9 19:02:52.070099 kernel: intel_pstate: CPU model not supported Feb 9 19:02:52.070114 kernel: efifb: probing for efifb Feb 9 19:02:52.070133 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 19:02:52.070145 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 19:02:52.070158 kernel: efifb: scrolling: redraw Feb 9 19:02:52.070176 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:02:52.070189 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:02:52.070202 kernel: fb0: EFI VGA frame buffer device Feb 9 19:02:52.070215 kernel: pstore: Registered efi as persistent store backend Feb 9 19:02:52.070228 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:02:52.070242 kernel: Segment Routing with IPv6 Feb 9 19:02:52.070256 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:02:52.070269 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:02:52.070283 kernel: Key type dns_resolver registered Feb 9 19:02:52.070299 kernel: IPI shorthand broadcast: enabled Feb 9 19:02:52.070313 kernel: sched_clock: Marking stable (886429800, 27817600)->(1144752500, -230505100) Feb 9 19:02:52.070327 kernel: registered taskstats version 1 Feb 9 19:02:52.070341 kernel: Loading compiled-in X.509 certificates Feb 9 19:02:52.070354 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:02:52.070368 kernel: Key type .fscrypt registered Feb 9 19:02:52.070381 kernel: Key type fscrypt-provisioning registered Feb 9 19:02:52.070394 kernel: pstore: Using crash dump compression: deflate Feb 9 19:02:52.070410 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:02:52.070424 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:02:52.070437 kernel: ima: No architecture policies found Feb 9 19:02:52.070451 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:02:52.070464 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:02:52.070478 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:02:52.070491 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:02:52.070521 kernel: Run /init as init process Feb 9 19:02:52.070537 kernel: with arguments: Feb 9 19:02:52.070549 kernel: /init Feb 9 19:02:52.070565 kernel: with environment: Feb 9 19:02:52.070578 kernel: HOME=/ Feb 9 19:02:52.070589 kernel: TERM=linux Feb 9 19:02:52.070601 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:02:52.070616 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:02:52.070632 systemd[1]: Detected virtualization microsoft. Feb 9 19:02:52.070646 systemd[1]: Detected architecture x86-64. Feb 9 19:02:52.070663 systemd[1]: Running in initrd. Feb 9 19:02:52.070675 systemd[1]: No hostname configured, using default hostname. Feb 9 19:02:52.070686 systemd[1]: Hostname set to . Feb 9 19:02:52.070700 systemd[1]: Initializing machine ID from random generator. Feb 9 19:02:52.070714 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:02:52.070726 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:02:52.070739 systemd[1]: Reached target cryptsetup.target. Feb 9 19:02:52.070753 systemd[1]: Reached target paths.target. Feb 9 19:02:52.070766 systemd[1]: Reached target slices.target. Feb 9 19:02:52.070782 systemd[1]: Reached target swap.target. Feb 9 19:02:52.070796 systemd[1]: Reached target timers.target. Feb 9 19:02:52.070808 systemd[1]: Listening on iscsid.socket. Feb 9 19:02:52.070820 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:02:52.070832 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:02:52.070845 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:02:52.070858 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:02:52.070874 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:02:52.070887 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:02:52.070900 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:02:52.070915 systemd[1]: Reached target sockets.target. Feb 9 19:02:52.070929 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:02:52.070943 systemd[1]: Finished network-cleanup.service. Feb 9 19:02:52.070955 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:02:52.070968 systemd[1]: Starting systemd-journald.service... Feb 9 19:02:52.070981 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:02:52.071005 systemd[1]: Starting systemd-resolved.service... Feb 9 19:02:52.071018 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:02:52.071035 systemd-journald[183]: Journal started Feb 9 19:02:52.071102 systemd-journald[183]: Runtime Journal (/run/log/journal/8fb8553fbd47440db5b5f518dcbd45ab) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:02:52.067261 systemd-modules-load[184]: Inserted module 'overlay' Feb 9 19:02:52.083523 systemd[1]: Started systemd-journald.service. Feb 9 19:02:52.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.112012 kernel: audit: type=1130 audit(1707505372.095:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.096084 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:02:52.112311 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:02:52.116672 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:02:52.146549 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:02:52.146582 kernel: audit: type=1130 audit(1707505372.111:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.125458 systemd-resolved[185]: Positive Trust Anchors: Feb 9 19:02:52.164404 kernel: audit: type=1130 audit(1707505372.115:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.164439 kernel: Bridge firewalling registered Feb 9 19:02:52.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.125470 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:02:52.125528 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:02:52.128210 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 9 19:02:52.142255 systemd[1]: Started systemd-resolved.service. Feb 9 19:02:52.211829 kernel: SCSI subsystem initialized Feb 9 19:02:52.211872 kernel: audit: type=1130 audit(1707505372.141:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.164117 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 9 19:02:52.168695 systemd[1]: Reached target nss-lookup.target. Feb 9 19:02:52.187422 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:02:52.190952 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:02:52.215889 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:02:52.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.251737 kernel: audit: type=1130 audit(1707505372.168:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.251827 kernel: audit: type=1130 audit(1707505372.217:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.252275 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:02:52.275901 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:02:52.275933 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:02:52.275954 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:02:52.271378 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:02:52.278201 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 9 19:02:52.295728 kernel: audit: type=1130 audit(1707505372.269:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.279814 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:02:52.294997 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:02:52.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.310621 kernel: audit: type=1130 audit(1707505372.293:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.317134 dracut-cmdline[200]: dracut-dracut-053 Feb 9 19:02:52.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.321878 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:02:52.339926 kernel: audit: type=1130 audit(1707505372.324:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.339957 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:02:52.381541 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:02:52.395523 kernel: iscsi: registered transport (tcp) Feb 9 19:02:52.420440 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:02:52.420526 kernel: QLogic iSCSI HBA Driver Feb 9 19:02:52.450141 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:02:52.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.453826 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:02:52.506533 kernel: raid6: avx512x4 gen() 18124 MB/s Feb 9 19:02:52.526512 kernel: raid6: avx512x4 xor() 6452 MB/s Feb 9 19:02:52.546512 kernel: raid6: avx512x2 gen() 18127 MB/s Feb 9 19:02:52.566515 kernel: raid6: avx512x2 xor() 29052 MB/s Feb 9 19:02:52.586510 kernel: raid6: avx512x1 gen() 18064 MB/s Feb 9 19:02:52.606516 kernel: raid6: avx512x1 xor() 26683 MB/s Feb 9 19:02:52.626513 kernel: raid6: avx2x4 gen() 17991 MB/s Feb 9 19:02:52.646511 kernel: raid6: avx2x4 xor() 6742 MB/s Feb 9 19:02:52.666512 kernel: raid6: avx2x2 gen() 18019 MB/s Feb 9 19:02:52.687518 kernel: raid6: avx2x2 xor() 21609 MB/s Feb 9 19:02:52.707516 kernel: raid6: avx2x1 gen() 13388 MB/s Feb 9 19:02:52.727512 kernel: raid6: avx2x1 xor() 18873 MB/s Feb 9 19:02:52.747515 kernel: raid6: sse2x4 gen() 11367 MB/s Feb 9 19:02:52.767514 kernel: raid6: sse2x4 xor() 5934 MB/s Feb 9 19:02:52.787513 kernel: raid6: sse2x2 gen() 12224 MB/s Feb 9 19:02:52.808514 kernel: raid6: sse2x2 xor() 7401 MB/s Feb 9 19:02:52.828512 kernel: raid6: sse2x1 gen() 11487 MB/s Feb 9 19:02:52.856276 kernel: raid6: sse2x1 xor() 5627 MB/s Feb 9 19:02:52.856304 kernel: raid6: using algorithm avx512x2 gen() 18127 MB/s Feb 9 19:02:52.856321 kernel: raid6: .... xor() 29052 MB/s, rmw enabled Feb 9 19:02:52.863040 kernel: raid6: using avx512x2 recovery algorithm Feb 9 19:02:52.878529 kernel: xor: automatically using best checksumming function avx Feb 9 19:02:52.975533 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:02:52.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:52.987000 audit: BPF prog-id=7 op=LOAD Feb 9 19:02:52.987000 audit: BPF prog-id=8 op=LOAD Feb 9 19:02:52.984444 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:02:52.988129 systemd[1]: Starting systemd-udevd.service... Feb 9 19:02:53.006030 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 9 19:02:53.010816 systemd[1]: Started systemd-udevd.service. Feb 9 19:02:53.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:53.024557 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:02:53.037030 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Feb 9 19:02:53.067766 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:02:53.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:53.074617 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:02:53.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:53.110286 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:02:53.158525 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:02:53.188522 kernel: hv_vmbus: Vmbus version:5.2 Feb 9 19:02:53.197535 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 19:02:53.212521 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:02:53.217524 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:02:53.217571 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 19:02:53.224609 kernel: AES CTR mode by8 optimization enabled Feb 9 19:02:53.224651 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 19:02:53.243509 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 19:02:53.250526 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 19:02:53.256531 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 19:02:53.266529 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 19:02:53.270521 kernel: scsi host1: storvsc_host_t Feb 9 19:02:53.270733 kernel: scsi host0: storvsc_host_t Feb 9 19:02:53.279522 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 19:02:53.285525 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 19:02:53.312627 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 19:02:53.312904 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:02:53.314527 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 19:02:53.328369 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 19:02:53.328599 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 19:02:53.328727 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 19:02:53.336683 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 19:02:53.336885 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 19:02:53.342527 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:02:53.346521 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 19:02:53.427130 kernel: hv_netvsc 000d3ad7-e982-000d-3ad7-e982000d3ad7 eth0: VF slot 1 added Feb 9 19:02:53.437526 kernel: hv_vmbus: registering driver hv_pci Feb 9 19:02:53.444522 kernel: hv_pci 062879cb-c8d6-49ce-ab83-209aa16664de: PCI VMBus probing: Using version 0x10004 Feb 9 19:02:53.459528 kernel: hv_pci 062879cb-c8d6-49ce-ab83-209aa16664de: PCI host bridge to bus c8d6:00 Feb 9 19:02:53.470226 kernel: pci_bus c8d6:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 9 19:02:53.470431 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (448) Feb 9 19:02:53.470448 kernel: pci_bus c8d6:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 19:02:53.469886 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:02:53.505526 kernel: pci c8d6:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 9 19:02:53.523060 kernel: pci c8d6:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:02:53.520081 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:02:53.536941 kernel: pci c8d6:00:02.0: enabling Extended Tags Feb 9 19:02:53.552860 kernel: pci c8d6:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at c8d6:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 9 19:02:53.562814 kernel: pci_bus c8d6:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 19:02:53.563046 kernel: pci c8d6:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:02:53.594006 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:02:53.609855 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:02:53.616229 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:02:53.630902 systemd[1]: Starting disk-uuid.service... Feb 9 19:02:53.653524 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:02:53.665522 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:02:53.692524 kernel: mlx5_core c8d6:00:02.0: firmware version: 14.30.1350 Feb 9 19:02:53.889529 kernel: mlx5_core c8d6:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 19:02:54.033360 kernel: mlx5_core c8d6:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 9 19:02:54.033658 kernel: mlx5_core c8d6:00:02.0: mlx5e_tc_post_act_init:40:(pid 209): firmware level support is missing Feb 9 19:02:54.046089 kernel: hv_netvsc 000d3ad7-e982-000d-3ad7-e982000d3ad7 eth0: VF registering: eth1 Feb 9 19:02:54.046263 kernel: mlx5_core c8d6:00:02.0 eth1: joined to eth0 Feb 9 19:02:54.058526 kernel: mlx5_core c8d6:00:02.0 enP51414s1: renamed from eth1 Feb 9 19:02:54.663535 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:02:54.664314 disk-uuid[549]: The operation has completed successfully. Feb 9 19:02:54.729429 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:02:54.729567 systemd[1]: Finished disk-uuid.service. Feb 9 19:02:54.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:54.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:54.751254 systemd[1]: Starting verity-setup.service... Feb 9 19:02:54.779532 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:02:54.847217 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:02:54.852641 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:02:54.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:54.858252 systemd[1]: Finished verity-setup.service. Feb 9 19:02:54.934529 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:02:54.934662 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:02:54.938783 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:02:54.943230 systemd[1]: Starting ignition-setup.service... Feb 9 19:02:54.947649 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:02:54.966380 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:02:54.966420 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:02:54.966432 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:02:55.006416 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:02:55.027550 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:02:55.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.032000 audit: BPF prog-id=9 op=LOAD Feb 9 19:02:55.033568 systemd[1]: Starting systemd-networkd.service... Feb 9 19:02:55.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.051836 systemd[1]: Finished ignition-setup.service. Feb 9 19:02:55.058192 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:02:55.066878 systemd-networkd[808]: lo: Link UP Feb 9 19:02:55.066887 systemd-networkd[808]: lo: Gained carrier Feb 9 19:02:55.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.067936 systemd-networkd[808]: Enumeration completed Feb 9 19:02:55.068018 systemd[1]: Started systemd-networkd.service. Feb 9 19:02:55.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.071408 systemd[1]: Reached target network.target. Feb 9 19:02:55.072421 systemd-networkd[808]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:02:55.092901 iscsid[815]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:02:55.092901 iscsid[815]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:02:55.092901 iscsid[815]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:02:55.092901 iscsid[815]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:02:55.092901 iscsid[815]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:02:55.092901 iscsid[815]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:02:55.092901 iscsid[815]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:02:55.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.076380 systemd[1]: Starting iscsiuio.service... Feb 9 19:02:55.082820 systemd[1]: Started iscsiuio.service. Feb 9 19:02:55.086590 systemd[1]: Starting iscsid.service... Feb 9 19:02:55.093735 systemd[1]: Started iscsid.service. Feb 9 19:02:55.100112 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:02:55.143624 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:02:55.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.148029 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:02:55.152629 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:02:55.162704 kernel: mlx5_core c8d6:00:02.0 enP51414s1: Link up Feb 9 19:02:55.157984 systemd[1]: Reached target remote-fs.target. Feb 9 19:02:55.163729 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:02:55.174941 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:02:55.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.253527 kernel: hv_netvsc 000d3ad7-e982-000d-3ad7-e982000d3ad7 eth0: Data path switched to VF: enP51414s1 Feb 9 19:02:55.259095 systemd-networkd[808]: enP51414s1: Link UP Feb 9 19:02:55.261476 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:55.261446 systemd-networkd[808]: eth0: Link UP Feb 9 19:02:55.263834 systemd-networkd[808]: eth0: Gained carrier Feb 9 19:02:55.271752 systemd-networkd[808]: enP51414s1: Gained carrier Feb 9 19:02:55.305622 systemd-networkd[808]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:02:55.837185 ignition[810]: Ignition 2.14.0 Feb 9 19:02:55.837203 ignition[810]: Stage: fetch-offline Feb 9 19:02:55.837281 ignition[810]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:55.837341 ignition[810]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:55.872726 ignition[810]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:55.872981 ignition[810]: parsed url from cmdline: "" Feb 9 19:02:55.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:55.874722 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:02:55.872986 ignition[810]: no config URL provided Feb 9 19:02:55.879715 systemd[1]: Starting ignition-fetch.service... Feb 9 19:02:55.872992 ignition[810]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:02:55.873005 ignition[810]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:02:55.873011 ignition[810]: failed to fetch config: resource requires networking Feb 9 19:02:55.873139 ignition[810]: Ignition finished successfully Feb 9 19:02:55.890749 ignition[834]: Ignition 2.14.0 Feb 9 19:02:55.890756 ignition[834]: Stage: fetch Feb 9 19:02:55.890873 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:55.890914 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:55.895772 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:55.895949 ignition[834]: parsed url from cmdline: "" Feb 9 19:02:55.895956 ignition[834]: no config URL provided Feb 9 19:02:55.895962 ignition[834]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:02:55.895981 ignition[834]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:02:55.896020 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 19:02:55.985207 ignition[834]: GET result: OK Feb 9 19:02:55.985436 ignition[834]: config has been read from IMDS userdata Feb 9 19:02:55.985483 ignition[834]: parsing config with SHA512: 5f0387ae47012e68604158ed7f70a838992f7c4924282119edf5b8192206c6feab025018e995411acfca0246775939e2881f60de750bda5b1b0083ffc5f5ecb7 Feb 9 19:02:56.019641 unknown[834]: fetched base config from "system" Feb 9 19:02:56.019655 unknown[834]: fetched base config from "system" Feb 9 19:02:56.020338 ignition[834]: fetch: fetch complete Feb 9 19:02:56.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.019664 unknown[834]: fetched user config from "azure" Feb 9 19:02:56.020346 ignition[834]: fetch: fetch passed Feb 9 19:02:56.024394 systemd[1]: Finished ignition-fetch.service. Feb 9 19:02:56.020390 ignition[834]: Ignition finished successfully Feb 9 19:02:56.027817 systemd[1]: Starting ignition-kargs.service... Feb 9 19:02:56.040338 ignition[840]: Ignition 2.14.0 Feb 9 19:02:56.040347 ignition[840]: Stage: kargs Feb 9 19:02:56.040472 ignition[840]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:56.040511 ignition[840]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:56.047645 ignition[840]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:56.049869 ignition[840]: kargs: kargs passed Feb 9 19:02:56.053360 systemd[1]: Finished ignition-kargs.service. Feb 9 19:02:56.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.049928 ignition[840]: Ignition finished successfully Feb 9 19:02:56.058211 systemd[1]: Starting ignition-disks.service... Feb 9 19:02:56.069993 ignition[846]: Ignition 2.14.0 Feb 9 19:02:56.070004 ignition[846]: Stage: disks Feb 9 19:02:56.070155 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:56.070189 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:56.078215 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:56.080766 ignition[846]: disks: disks passed Feb 9 19:02:56.080830 ignition[846]: Ignition finished successfully Feb 9 19:02:56.085685 systemd[1]: Finished ignition-disks.service. Feb 9 19:02:56.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.091039 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:02:56.098293 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:02:56.103434 systemd[1]: Reached target local-fs.target. Feb 9 19:02:56.114915 systemd[1]: Reached target sysinit.target. Feb 9 19:02:56.119560 systemd[1]: Reached target basic.target. Feb 9 19:02:56.124655 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:02:56.146173 systemd-fsck[854]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 9 19:02:56.152031 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:02:56.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.158888 systemd[1]: Mounting sysroot.mount... Feb 9 19:02:56.179525 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:02:56.180080 systemd[1]: Mounted sysroot.mount. Feb 9 19:02:56.184903 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:02:56.198580 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:02:56.207663 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 19:02:56.215239 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:02:56.215295 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:02:56.231144 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:02:56.244752 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:02:56.249457 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:02:56.257806 initrd-setup-root[869]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:02:56.271343 initrd-setup-root[877]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:02:56.274629 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (864) Feb 9 19:02:56.283346 initrd-setup-root[885]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:02:56.291992 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:02:56.292031 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:02:56.292049 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:02:56.292066 initrd-setup-root[896]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:02:56.300697 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:02:56.413974 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:02:56.421949 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:02:56.421978 kernel: audit: type=1130 audit(1707505376.416:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.423721 systemd[1]: Starting ignition-mount.service... Feb 9 19:02:56.437635 systemd[1]: Starting sysroot-boot.service... Feb 9 19:02:56.445472 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:02:56.445637 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:02:56.464931 ignition[931]: INFO : Ignition 2.14.0 Feb 9 19:02:56.469350 ignition[931]: INFO : Stage: mount Feb 9 19:02:56.469350 ignition[931]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:56.469350 ignition[931]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:56.474654 systemd[1]: Finished sysroot-boot.service. Feb 9 19:02:56.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.489678 ignition[931]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:56.489678 ignition[931]: INFO : mount: mount passed Feb 9 19:02:56.489678 ignition[931]: INFO : Ignition finished successfully Feb 9 19:02:56.523584 kernel: audit: type=1130 audit(1707505376.487:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.523619 kernel: audit: type=1130 audit(1707505376.506:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.490604 systemd[1]: Finished ignition-mount.service. Feb 9 19:02:56.500486 systemd-networkd[808]: eth0: Gained IPv6LL Feb 9 19:02:56.673267 coreos-metadata[863]: Feb 09 19:02:56.673 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:02:56.679062 coreos-metadata[863]: Feb 09 19:02:56.679 INFO Fetch successful Feb 9 19:02:56.711709 coreos-metadata[863]: Feb 09 19:02:56.711 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:02:56.730779 coreos-metadata[863]: Feb 09 19:02:56.730 INFO Fetch successful Feb 9 19:02:56.738895 coreos-metadata[863]: Feb 09 19:02:56.738 INFO wrote hostname ci-3510.3.2-a-dbdb6b501f to /sysroot/etc/hostname Feb 9 19:02:56.744612 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 19:02:56.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.748138 systemd[1]: Starting ignition-files.service... Feb 9 19:02:56.767848 kernel: audit: type=1130 audit(1707505376.746:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:56.759424 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:02:56.783288 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (942) Feb 9 19:02:56.783337 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:02:56.783349 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:02:56.787218 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:02:56.794399 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:02:56.807544 ignition[961]: INFO : Ignition 2.14.0 Feb 9 19:02:56.810241 ignition[961]: INFO : Stage: files Feb 9 19:02:56.810241 ignition[961]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:02:56.810241 ignition[961]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:02:56.823783 ignition[961]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:02:56.832584 ignition[961]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:02:56.836276 ignition[961]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:02:56.836276 ignition[961]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:02:56.854879 ignition[961]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:02:56.858426 ignition[961]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:02:56.862221 unknown[961]: wrote ssh authorized keys file for user: core Feb 9 19:02:56.864750 ignition[961]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:02:56.864750 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:02:56.864750 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:02:57.503347 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:02:57.646774 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:02:57.656037 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:02:57.656037 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:02:57.666969 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:02:57.747527 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:02:57.903692 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:02:57.911431 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:02:57.911431 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:02:58.418991 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:02:58.613378 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:02:58.621509 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:02:58.621509 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:02:58.621509 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:02:58.808982 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:02:59.087232 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 9 19:02:59.098153 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:02:59.098153 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:02:59.098153 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:02:59.217780 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:02:59.473765 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 19:02:59.482937 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:02:59.482937 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:02:59.482937 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:02:59.612176 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:03:00.147329 ignition[961]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 19:03:00.156704 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:03:00.156704 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:03:00.156704 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:03:00.156704 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:03:00.156704 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:03:00.179878 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:03:00.179878 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:03:00.179878 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:03:00.195238 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:03:00.200033 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:03:00.204614 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:03:00.209203 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:03:00.213941 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:03:00.218595 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:03:00.223620 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:03:00.239520 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160990758" Feb 9 19:03:00.239520 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160990758": device or resource busy Feb 9 19:03:00.239520 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem160990758", trying btrfs: device or resource busy Feb 9 19:03:00.239520 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160990758" Feb 9 19:03:00.265482 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (961) Feb 9 19:03:00.251281 systemd[1]: mnt-oem160990758.mount: Deactivated successfully. Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160990758" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem160990758" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem160990758" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3062233366" Feb 9 19:03:00.268334 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3062233366": device or resource busy Feb 9 19:03:00.268334 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3062233366", trying btrfs: device or resource busy Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3062233366" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3062233366" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3062233366" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3062233366" Feb 9 19:03:00.268334 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:03:00.268334 ignition[961]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 19:03:00.268334 ignition[961]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 19:03:00.410569 kernel: audit: type=1130 audit(1707505380.275:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.410608 kernel: audit: type=1130 audit(1707505380.350:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.410621 kernel: audit: type=1130 audit(1707505380.372:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.410635 kernel: audit: type=1131 audit(1707505380.372:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.264009 systemd[1]: mnt-oem3062233366.mount: Deactivated successfully. Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1d): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1d): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(20): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:03:00.411015 ignition[961]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:03:00.268544 systemd[1]: Finished ignition-files.service. Feb 9 19:03:00.504932 ignition[961]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:03:00.504932 ignition[961]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:03:00.504932 ignition[961]: INFO : files: op(23): [started] setting preset to enabled for "waagent.service" Feb 9 19:03:00.504932 ignition[961]: INFO : files: op(23): [finished] setting preset to enabled for "waagent.service" Feb 9 19:03:00.504932 ignition[961]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:03:00.504932 ignition[961]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:03:00.504932 ignition[961]: INFO : files: files passed Feb 9 19:03:00.504932 ignition[961]: INFO : Ignition finished successfully Feb 9 19:03:00.563100 kernel: audit: type=1130 audit(1707505380.519:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.563134 kernel: audit: type=1131 audit(1707505380.519:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.278065 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:03:00.566152 initrd-setup-root-after-ignition[986]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:03:00.292020 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:03:00.293726 systemd[1]: Starting ignition-quench.service... Feb 9 19:03:00.337043 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:03:00.365876 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:03:00.365995 systemd[1]: Finished ignition-quench.service. Feb 9 19:03:00.373009 systemd[1]: Reached target ignition-complete.target. Feb 9 19:03:00.395709 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:03:00.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.515868 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:03:00.515967 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:03:00.533245 systemd[1]: Reached target initrd-fs.target. Feb 9 19:03:00.556803 systemd[1]: Reached target initrd.target. Feb 9 19:03:00.563271 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:03:00.580794 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:03:00.592683 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:03:00.597094 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:03:00.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.615374 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:03:00.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.615483 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:03:00.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.692316 iscsid[815]: iscsid shutting down. Feb 9 19:03:00.619080 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:03:00.697994 ignition[999]: INFO : Ignition 2.14.0 Feb 9 19:03:00.697994 ignition[999]: INFO : Stage: umount Feb 9 19:03:00.697994 ignition[999]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:03:00.697994 ignition[999]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:03:00.622268 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:03:00.715099 ignition[999]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:03:00.715099 ignition[999]: INFO : umount: umount passed Feb 9 19:03:00.715099 ignition[999]: INFO : Ignition finished successfully Feb 9 19:03:00.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.624682 systemd[1]: Stopped target timers.target. Feb 9 19:03:00.626666 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:03:00.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.626735 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:03:00.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.629081 systemd[1]: Stopped target initrd.target. Feb 9 19:03:00.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.633524 systemd[1]: Stopped target basic.target. Feb 9 19:03:00.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.635702 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:03:00.638078 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:03:00.640430 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:03:00.641456 systemd[1]: Stopped target remote-fs.target. Feb 9 19:03:00.641914 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:03:00.642401 systemd[1]: Stopped target sysinit.target. Feb 9 19:03:00.642855 systemd[1]: Stopped target local-fs.target. Feb 9 19:03:00.643300 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:03:00.643773 systemd[1]: Stopped target swap.target. Feb 9 19:03:00.644237 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:03:00.644303 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:03:00.644759 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:03:00.645216 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:03:00.645252 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:03:00.645807 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:03:00.645841 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:03:00.646216 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:03:00.646248 systemd[1]: Stopped ignition-files.service. Feb 9 19:03:00.646715 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 19:03:00.646748 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 19:03:00.647953 systemd[1]: Stopping ignition-mount.service... Feb 9 19:03:00.650368 systemd[1]: Stopping iscsid.service... Feb 9 19:03:00.677795 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:03:00.678793 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:03:00.678862 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:03:00.682397 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:03:00.682458 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:03:00.685121 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:03:00.685256 systemd[1]: Stopped iscsid.service. Feb 9 19:03:00.695559 systemd[1]: Stopping iscsiuio.service... Feb 9 19:03:00.712740 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:03:00.712898 systemd[1]: Stopped iscsiuio.service. Feb 9 19:03:00.727926 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:03:00.728624 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:03:00.728732 systemd[1]: Stopped ignition-mount.service. Feb 9 19:03:00.734179 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:03:00.734227 systemd[1]: Stopped ignition-disks.service. Feb 9 19:03:00.738564 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:03:00.738622 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:03:00.741288 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:03:00.741338 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:03:00.745358 systemd[1]: Stopped target network.target. Feb 9 19:03:00.747601 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:03:00.747661 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:03:00.751964 systemd[1]: Stopped target paths.target. Feb 9 19:03:00.754081 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:03:00.759552 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:03:00.768567 systemd[1]: Stopped target slices.target. Feb 9 19:03:00.773279 systemd[1]: Stopped target sockets.target. Feb 9 19:03:00.777530 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:03:00.779455 systemd[1]: Closed iscsid.socket. Feb 9 19:03:00.872202 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:03:00.872265 systemd[1]: Closed iscsiuio.socket. Feb 9 19:03:00.878151 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:03:00.878236 systemd[1]: Stopped ignition-setup.service. Feb 9 19:03:00.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.884837 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:03:00.889067 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:03:00.894666 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:03:00.894786 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:03:00.897862 systemd-networkd[808]: eth0: DHCPv6 lease lost Feb 9 19:03:00.901000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:03:00.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.904367 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:03:00.906838 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:03:00.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.912084 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:03:00.912129 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:03:00.918000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:03:00.919628 systemd[1]: Stopping network-cleanup.service... Feb 9 19:03:00.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.921559 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:03:00.921634 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:03:00.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.924236 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:03:00.924307 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:03:00.927252 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:03:00.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.927293 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:03:00.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.932355 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:03:00.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.937633 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:03:00.937809 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:03:00.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:00.942266 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:03:00.942304 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:03:00.946650 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:03:00.946690 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:03:00.950402 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:03:00.950455 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:03:00.955291 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:03:00.955344 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:03:00.959998 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:03:00.960050 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:03:00.965313 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:03:00.969401 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:03:00.969468 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:03:00.972551 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:03:00.972608 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:03:00.975185 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:03:00.975222 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:03:00.984928 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:03:00.987680 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:03:01.031535 kernel: hv_netvsc 000d3ad7-e982-000d-3ad7-e982000d3ad7 eth0: Data path switched from VF: enP51414s1 Feb 9 19:03:01.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:01.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:01.053084 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:03:01.053217 systemd[1]: Stopped network-cleanup.service. Feb 9 19:03:01.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:01.243391 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:03:01.243556 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:03:02.208113 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:03:02.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:02.208261 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:03:02.243921 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 9 19:03:02.243955 kernel: audit: type=1131 audit(1707505382.211:80): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:02.212542 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:03:02.215000 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:03:02.215398 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:03:02.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:02.273538 kernel: audit: type=1131 audit(1707505382.243:81): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:02.273418 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:03:02.287263 systemd[1]: Switching root. Feb 9 19:03:02.309781 systemd-journald[183]: Journal stopped Feb 9 19:03:07.226563 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 9 19:03:07.226609 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:03:07.226628 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:03:07.226644 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:03:07.226660 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:03:07.226679 kernel: SELinux: policy capability open_perms=1 Feb 9 19:03:07.226700 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:03:07.226720 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:03:07.226735 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:03:07.226752 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:03:07.226766 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:03:07.226781 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:03:07.226800 kernel: audit: type=1403 audit(1707505383.003:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:03:07.226822 systemd[1]: Successfully loaded SELinux policy in 137.893ms. Feb 9 19:03:07.226845 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.637ms. Feb 9 19:03:07.226866 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:03:07.226883 systemd[1]: Detected virtualization microsoft. Feb 9 19:03:07.226899 systemd[1]: Detected architecture x86-64. Feb 9 19:03:07.226921 systemd[1]: Detected first boot. Feb 9 19:03:07.226940 systemd[1]: Hostname set to . Feb 9 19:03:07.226959 systemd[1]: Initializing machine ID from random generator. Feb 9 19:03:07.227112 kernel: audit: type=1400 audit(1707505383.241:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:03:07.227129 kernel: audit: type=1400 audit(1707505383.258:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:03:07.227143 kernel: audit: type=1400 audit(1707505383.258:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:03:07.227158 kernel: audit: type=1334 audit(1707505383.281:86): prog-id=10 op=LOAD Feb 9 19:03:07.227167 kernel: audit: type=1334 audit(1707505383.281:87): prog-id=10 op=UNLOAD Feb 9 19:03:07.227180 kernel: audit: type=1334 audit(1707505383.299:88): prog-id=11 op=LOAD Feb 9 19:03:07.227189 kernel: audit: type=1334 audit(1707505383.299:89): prog-id=11 op=UNLOAD Feb 9 19:03:07.227200 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:03:07.227210 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:03:07.227221 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:03:07.227232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:03:07.227247 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:03:07.227257 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:03:07.227268 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:03:07.227279 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:03:07.227291 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:03:07.227300 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:03:07.227311 systemd[1]: Created slice system-getty.slice. Feb 9 19:03:07.227324 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:03:07.227337 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:03:07.227349 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:03:07.227361 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:03:07.227372 systemd[1]: Created slice user.slice. Feb 9 19:03:07.227384 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:03:07.227393 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:03:07.227405 systemd[1]: Set up automount boot.automount. Feb 9 19:03:07.227416 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:03:07.227427 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:03:07.227440 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:03:07.227451 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:03:07.227464 systemd[1]: Reached target integritysetup.target. Feb 9 19:03:07.227474 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:03:07.227485 systemd[1]: Reached target remote-fs.target. Feb 9 19:03:07.227496 systemd[1]: Reached target slices.target. Feb 9 19:03:07.227521 systemd[1]: Reached target swap.target. Feb 9 19:03:07.227536 systemd[1]: Reached target torcx.target. Feb 9 19:03:07.227546 systemd[1]: Reached target veritysetup.target. Feb 9 19:03:07.227558 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:03:07.227568 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:03:07.227581 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:03:07.227592 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:03:07.227606 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:03:07.227615 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:03:07.227628 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:03:07.227640 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:03:07.227651 systemd[1]: Mounting media.mount... Feb 9 19:03:07.227662 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:03:07.227674 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:03:07.227687 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:03:07.227698 systemd[1]: Mounting tmp.mount... Feb 9 19:03:07.227711 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:03:07.227723 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:03:07.227734 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:03:07.227745 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:03:07.227756 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:03:07.227769 systemd[1]: Starting modprobe@drm.service... Feb 9 19:03:07.227779 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:03:07.227790 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:03:07.227804 systemd[1]: Starting modprobe@loop.service... Feb 9 19:03:07.227816 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:03:07.227826 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:03:07.227839 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:03:07.227850 kernel: loop: module loaded Feb 9 19:03:07.227860 kernel: fuse: init (API version 7.34) Feb 9 19:03:07.227869 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:03:07.227882 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:03:07.227894 systemd[1]: Stopped systemd-journald.service. Feb 9 19:03:07.227907 systemd[1]: Starting systemd-journald.service... Feb 9 19:03:07.227917 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:03:07.227929 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:03:07.227942 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:03:07.227952 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:03:07.227963 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:03:07.227974 systemd[1]: Stopped verity-setup.service. Feb 9 19:03:07.227986 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 19:03:07.227995 kernel: audit: type=1305 audit(1707505387.219:111): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:03:07.228013 systemd-journald[1142]: Journal started Feb 9 19:03:07.228061 systemd-journald[1142]: Runtime Journal (/run/log/journal/c6856df111af412fb269a0eac5a910bb) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:03:03.003000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:03:03.241000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:03:03.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:03:03.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:03:03.281000 audit: BPF prog-id=10 op=LOAD Feb 9 19:03:03.281000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:03:03.299000 audit: BPF prog-id=11 op=LOAD Feb 9 19:03:03.299000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:03:03.647000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:03:03.647000 audit[1033]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:03.647000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:03:03.655000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:03:03.655000 audit[1033]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:03.655000 audit: CWD cwd="/" Feb 9 19:03:03.655000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:03.655000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:03.655000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:03:06.795000 audit: BPF prog-id=12 op=LOAD Feb 9 19:03:06.795000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:03:06.795000 audit: BPF prog-id=13 op=LOAD Feb 9 19:03:06.795000 audit: BPF prog-id=14 op=LOAD Feb 9 19:03:06.795000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:03:06.795000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:03:06.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:06.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:06.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:06.824000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:03:07.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.170000 audit: BPF prog-id=15 op=LOAD Feb 9 19:03:07.171000 audit: BPF prog-id=16 op=LOAD Feb 9 19:03:07.171000 audit: BPF prog-id=17 op=LOAD Feb 9 19:03:07.171000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:03:07.171000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:03:07.219000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:03:03.643124 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:03:06.793990 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:03:03.643672 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:03:06.796855 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:03:03.643692 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:03:03.643727 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:03:03.643736 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:03:03.643774 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:03:03.643785 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:03:03.643979 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:03:03.644023 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:03:03.644035 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:03:03.644398 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:03:03.644431 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:03:03.644449 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:03:03.644463 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:03:03.644479 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:03:03.644491 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:03:06.265790 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:03:06.266050 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:03:06.266601 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:03:06.266859 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:03:06.266914 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:03:06.266971 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-02-09T19:03:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:03:07.257880 kernel: audit: type=1300 audit(1707505387.219:111): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffde70e7270 a2=4000 a3=7ffde70e730c items=0 ppid=1 pid=1142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:07.257948 kernel: audit: type=1327 audit(1707505387.219:111): proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:03:07.219000 audit[1142]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffde70e7270 a2=4000 a3=7ffde70e730c items=0 ppid=1 pid=1142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:07.219000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:03:07.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.278532 kernel: audit: type=1131 audit(1707505387.263:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.278574 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:03:07.293025 systemd[1]: Started systemd-journald.service. Feb 9 19:03:07.295132 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:03:07.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.310548 kernel: audit: type=1130 audit(1707505387.293:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.310977 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:03:07.313802 systemd[1]: Mounted media.mount. Feb 9 19:03:07.315683 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:03:07.318684 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:03:07.321183 systemd[1]: Mounted tmp.mount. Feb 9 19:03:07.323478 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:03:07.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.342356 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:03:07.342519 kernel: audit: type=1130 audit(1707505387.325:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.347162 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:03:07.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.351640 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:03:07.362526 kernel: audit: type=1130 audit(1707505387.346:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.365018 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:03:07.365158 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:03:07.391772 kernel: audit: type=1130 audit(1707505387.364:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.391817 kernel: audit: type=1131 audit(1707505387.364:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.392182 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:03:07.392327 systemd[1]: Finished modprobe@drm.service. Feb 9 19:03:07.410702 kernel: audit: type=1130 audit(1707505387.391:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.413817 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:03:07.413975 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:03:07.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.416652 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:03:07.416797 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:03:07.419320 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:03:07.419461 systemd[1]: Finished modprobe@loop.service. Feb 9 19:03:07.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.421924 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:03:07.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.424547 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:03:07.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.427402 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:03:07.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.430032 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:03:07.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.433172 systemd[1]: Reached target network-pre.target. Feb 9 19:03:07.436868 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:03:07.440573 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:03:07.442704 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:03:07.447488 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:03:07.450706 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:03:07.453140 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:03:07.454560 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:03:07.457469 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:03:07.458872 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:03:07.473625 systemd-journald[1142]: Time spent on flushing to /var/log/journal/c6856df111af412fb269a0eac5a910bb is 35.977ms for 1184 entries. Feb 9 19:03:07.473625 systemd-journald[1142]: System Journal (/var/log/journal/c6856df111af412fb269a0eac5a910bb) is 8.0M, max 2.6G, 2.6G free. Feb 9 19:03:07.547350 systemd-journald[1142]: Received client request to flush runtime journal. Feb 9 19:03:07.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.462722 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:03:07.468937 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:03:07.474150 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:03:07.548858 udevadm[1156]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:03:07.483050 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:03:07.485825 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:03:07.491082 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:03:07.516881 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:03:07.548496 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:03:07.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:07.691308 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:03:07.695739 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:03:07.776856 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:03:07.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:08.179163 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:03:08.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:08.183000 audit: BPF prog-id=18 op=LOAD Feb 9 19:03:08.183000 audit: BPF prog-id=19 op=LOAD Feb 9 19:03:08.183000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:03:08.183000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:03:08.184808 systemd[1]: Starting systemd-udevd.service... Feb 9 19:03:08.202078 systemd-udevd[1161]: Using default interface naming scheme 'v252'. Feb 9 19:03:08.311527 systemd[1]: Started systemd-udevd.service. Feb 9 19:03:08.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:08.314000 audit: BPF prog-id=20 op=LOAD Feb 9 19:03:08.316353 systemd[1]: Starting systemd-networkd.service... Feb 9 19:03:08.349000 audit: BPF prog-id=21 op=LOAD Feb 9 19:03:08.349000 audit: BPF prog-id=22 op=LOAD Feb 9 19:03:08.349000 audit: BPF prog-id=23 op=LOAD Feb 9 19:03:08.351014 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:03:08.363213 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:03:08.403437 systemd[1]: Started systemd-userdbd.service. Feb 9 19:03:08.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:08.476555 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:03:08.484624 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 19:03:08.488000 audit[1172]: AVC avc: denied { confidentiality } for pid=1172 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:03:08.501875 kernel: hv_vmbus: registering driver hv_balloon Feb 9 19:03:08.519943 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 19:03:08.520048 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 19:03:08.520068 kernel: hv_vmbus: registering driver hv_utils Feb 9 19:03:08.520085 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 19:03:08.539162 kernel: Console: switching to colour dummy device 80x25 Feb 9 19:03:08.547781 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:03:08.583167 systemd-networkd[1167]: lo: Link UP Feb 9 19:03:08.583528 systemd-networkd[1167]: lo: Gained carrier Feb 9 19:03:08.584239 systemd-networkd[1167]: Enumeration completed Feb 9 19:03:08.596019 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 19:03:08.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:08.488000 audit[1172]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5592130a7e60 a1=f884 a2=7fa103553bc5 a3=5 items=12 ppid=1161 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:08.488000 audit: CWD cwd="/" Feb 9 19:03:08.488000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=1 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=2 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=3 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=4 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=5 name=(null) inode=15603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=6 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=7 name=(null) inode=15604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=8 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=9 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=10 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PATH item=11 name=(null) inode=15606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:03:08.488000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:03:08.584476 systemd[1]: Started systemd-networkd.service. Feb 9 19:03:08.591894 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:03:08.611983 systemd-networkd[1167]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:03:08.626341 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 19:03:08.626458 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 19:03:08.626486 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 19:03:09.111867 kernel: mlx5_core c8d6:00:02.0 enP51414s1: Link up Feb 9 19:03:09.145934 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1169) Feb 9 19:03:09.159034 kernel: hv_netvsc 000d3ad7-e982-000d-3ad7-e982000d3ad7 eth0: Data path switched to VF: enP51414s1 Feb 9 19:03:09.161087 systemd-networkd[1167]: enP51414s1: Link UP Feb 9 19:03:09.161701 systemd-networkd[1167]: eth0: Link UP Feb 9 19:03:09.161769 systemd-networkd[1167]: eth0: Gained carrier Feb 9 19:03:09.169289 systemd-networkd[1167]: enP51414s1: Gained carrier Feb 9 19:03:09.231336 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 9 19:03:09.229360 systemd-networkd[1167]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:03:09.237342 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:03:09.290283 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:03:09.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:09.294558 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:03:09.393683 lvm[1239]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:03:09.419003 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:03:09.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:09.422493 systemd[1]: Reached target cryptsetup.target. Feb 9 19:03:09.426612 systemd[1]: Starting lvm2-activation.service... Feb 9 19:03:09.433106 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:03:09.457094 systemd[1]: Finished lvm2-activation.service. Feb 9 19:03:09.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:09.459925 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:03:09.462379 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:03:09.462411 systemd[1]: Reached target local-fs.target. Feb 9 19:03:09.464490 systemd[1]: Reached target machines.target. Feb 9 19:03:09.467932 systemd[1]: Starting ldconfig.service... Feb 9 19:03:09.470364 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:03:09.470462 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:03:09.471691 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:03:09.475240 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:03:09.480947 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:03:09.483795 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:03:09.484047 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:03:09.485470 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:03:09.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:09.509752 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:03:09.514083 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:03:10.013200 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1242 (bootctl) Feb 9 19:03:10.014858 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:03:10.409319 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:03:10.420144 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:03:10.571056 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:03:10.571763 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:03:10.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.668900 systemd-fsck[1250]: fsck.fat 4.2 (2021-01-31) Feb 9 19:03:10.668900 systemd-fsck[1250]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:03:10.671378 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:03:10.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.676500 systemd[1]: Mounting boot.mount... Feb 9 19:03:10.689026 systemd[1]: Mounted boot.mount. Feb 9 19:03:10.772178 systemd-networkd[1167]: eth0: Gained IPv6LL Feb 9 19:03:10.772485 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:03:10.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.783375 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:03:10.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.844497 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:03:10.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.848907 systemd[1]: Starting audit-rules.service... Feb 9 19:03:10.853537 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:03:10.857446 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:03:10.862000 audit: BPF prog-id=24 op=LOAD Feb 9 19:03:10.866000 audit: BPF prog-id=25 op=LOAD Feb 9 19:03:10.864425 systemd[1]: Starting systemd-resolved.service... Feb 9 19:03:10.868623 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:03:10.872263 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:03:10.885807 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:03:10.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.888590 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:03:10.897000 audit[1262]: SYSTEM_BOOT pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.900281 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:03:10.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.959716 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:03:10.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.979865 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:03:10.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:03:10.982565 systemd[1]: Reached target time-set.target. Feb 9 19:03:10.984000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:03:10.985982 augenrules[1276]: No rules Feb 9 19:03:10.984000 audit[1276]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffe7436a0 a2=420 a3=0 items=0 ppid=1256 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:10.984000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:03:10.986603 systemd[1]: Finished audit-rules.service. Feb 9 19:03:11.026070 systemd-resolved[1260]: Positive Trust Anchors: Feb 9 19:03:11.026087 systemd-resolved[1260]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:03:11.026124 systemd-resolved[1260]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:03:11.066508 systemd-resolved[1260]: Using system hostname 'ci-3510.3.2-a-dbdb6b501f'. Feb 9 19:03:11.068215 systemd[1]: Started systemd-resolved.service. Feb 9 19:03:11.071254 systemd[1]: Reached target network.target. Feb 9 19:03:11.073490 systemd[1]: Reached target network-online.target. Feb 9 19:03:11.075878 systemd[1]: Reached target nss-lookup.target. Feb 9 19:03:11.173778 systemd-timesyncd[1261]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Feb 9 19:03:11.173865 systemd-timesyncd[1261]: Initial clock synchronization to Fri 2024-02-09 19:03:11.173687 UTC. Feb 9 19:03:12.252647 ldconfig[1241]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:03:12.262118 systemd[1]: Finished ldconfig.service. Feb 9 19:03:12.265931 systemd[1]: Starting systemd-update-done.service... Feb 9 19:03:12.274322 systemd[1]: Finished systemd-update-done.service. Feb 9 19:03:12.277189 systemd[1]: Reached target sysinit.target. Feb 9 19:03:12.279467 systemd[1]: Started motdgen.path. Feb 9 19:03:12.281458 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:03:12.284704 systemd[1]: Started logrotate.timer. Feb 9 19:03:12.286919 systemd[1]: Started mdadm.timer. Feb 9 19:03:12.288626 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:03:12.290827 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:03:12.290882 systemd[1]: Reached target paths.target. Feb 9 19:03:12.292771 systemd[1]: Reached target timers.target. Feb 9 19:03:12.295093 systemd[1]: Listening on dbus.socket. Feb 9 19:03:12.298276 systemd[1]: Starting docker.socket... Feb 9 19:03:12.321575 systemd[1]: Listening on sshd.socket. Feb 9 19:03:12.324462 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:03:12.324999 systemd[1]: Listening on docker.socket. Feb 9 19:03:12.327206 systemd[1]: Reached target sockets.target. Feb 9 19:03:12.329348 systemd[1]: Reached target basic.target. Feb 9 19:03:12.331323 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:03:12.331354 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:03:12.332488 systemd[1]: Starting containerd.service... Feb 9 19:03:12.338015 systemd[1]: Starting dbus.service... Feb 9 19:03:12.340938 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:03:12.344443 systemd[1]: Starting extend-filesystems.service... Feb 9 19:03:12.346976 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:03:12.348282 systemd[1]: Starting motdgen.service... Feb 9 19:03:12.355519 systemd[1]: Started nvidia.service. Feb 9 19:03:12.358934 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:03:12.362676 systemd[1]: Starting prepare-critools.service... Feb 9 19:03:12.365982 systemd[1]: Starting prepare-helm.service... Feb 9 19:03:12.369454 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:03:12.373736 systemd[1]: Starting sshd-keygen.service... Feb 9 19:03:12.383141 systemd[1]: Starting systemd-logind.service... Feb 9 19:03:12.387196 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:03:12.387290 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:03:12.388020 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:03:12.389226 systemd[1]: Starting update-engine.service... Feb 9 19:03:12.393825 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:03:12.405381 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:03:12.405622 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:03:12.422279 jq[1306]: true Feb 9 19:03:12.423124 jq[1287]: false Feb 9 19:03:12.426295 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:03:12.426518 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:03:12.431875 tar[1311]: ./ Feb 9 19:03:12.431875 tar[1311]: ./loopback Feb 9 19:03:12.432159 tar[1312]: crictl Feb 9 19:03:12.435892 tar[1313]: linux-amd64/helm Feb 9 19:03:12.438670 extend-filesystems[1288]: Found sda Feb 9 19:03:12.447304 jq[1323]: true Feb 9 19:03:12.450805 extend-filesystems[1288]: Found sda1 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda2 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda3 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found usr Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda4 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda6 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda7 Feb 9 19:03:12.453507 extend-filesystems[1288]: Found sda9 Feb 9 19:03:12.453507 extend-filesystems[1288]: Checking size of /dev/sda9 Feb 9 19:03:12.498346 dbus-daemon[1286]: [system] SELinux support is enabled Feb 9 19:03:12.487557 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:03:12.542344 extend-filesystems[1288]: Old size kept for /dev/sda9 Feb 9 19:03:12.542344 extend-filesystems[1288]: Found sr0 Feb 9 19:03:12.487782 systemd[1]: Finished motdgen.service. Feb 9 19:03:12.530475 systemd[1]: Started dbus.service. Feb 9 19:03:12.538920 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:03:12.539120 systemd[1]: Finished extend-filesystems.service. Feb 9 19:03:12.544920 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:03:12.544958 systemd[1]: Reached target system-config.target. Feb 9 19:03:12.550400 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:03:12.550430 systemd[1]: Reached target user-config.target. Feb 9 19:03:12.627342 bash[1347]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:03:12.629329 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:03:12.641882 env[1319]: time="2024-02-09T19:03:12.641169626Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:03:12.682631 tar[1311]: ./bandwidth Feb 9 19:03:12.684793 systemd-logind[1303]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:03:12.688477 systemd-logind[1303]: New seat seat0. Feb 9 19:03:12.695533 systemd[1]: Started systemd-logind.service. Feb 9 19:03:12.762867 update_engine[1304]: I0209 19:03:12.762233 1304 main.cc:92] Flatcar Update Engine starting Feb 9 19:03:12.777517 systemd[1]: Started update-engine.service. Feb 9 19:03:12.777828 update_engine[1304]: I0209 19:03:12.777570 1304 update_check_scheduler.cc:74] Next update check in 9m54s Feb 9 19:03:12.782752 systemd[1]: Started locksmithd.service. Feb 9 19:03:12.784827 env[1319]: time="2024-02-09T19:03:12.784785523Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:03:12.785093 env[1319]: time="2024-02-09T19:03:12.785068624Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.787084 env[1319]: time="2024-02-09T19:03:12.787048828Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:03:12.791716 env[1319]: time="2024-02-09T19:03:12.791650237Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.791994 env[1319]: time="2024-02-09T19:03:12.791964238Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:03:12.792066 env[1319]: time="2024-02-09T19:03:12.791995638Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.792066 env[1319]: time="2024-02-09T19:03:12.792015838Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:03:12.792066 env[1319]: time="2024-02-09T19:03:12.792029438Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.792179 env[1319]: time="2024-02-09T19:03:12.792136938Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.792492 env[1319]: time="2024-02-09T19:03:12.792465739Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:03:12.793684 env[1319]: time="2024-02-09T19:03:12.792670140Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:03:12.793684 env[1319]: time="2024-02-09T19:03:12.792700040Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:03:12.793684 env[1319]: time="2024-02-09T19:03:12.792773140Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:03:12.793684 env[1319]: time="2024-02-09T19:03:12.792791140Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:03:12.792984 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:03:12.802389 env[1319]: time="2024-02-09T19:03:12.802355060Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:03:12.802483 env[1319]: time="2024-02-09T19:03:12.802400160Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:03:12.802483 env[1319]: time="2024-02-09T19:03:12.802424460Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:03:12.802483 env[1319]: time="2024-02-09T19:03:12.802466460Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802485260Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802504260Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802524960Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802547160Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802566360Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802586760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802612 env[1319]: time="2024-02-09T19:03:12.802610160Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.802862 env[1319]: time="2024-02-09T19:03:12.802628560Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:03:12.802862 env[1319]: time="2024-02-09T19:03:12.802755560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:03:12.802949 env[1319]: time="2024-02-09T19:03:12.802880261Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:03:12.803196 env[1319]: time="2024-02-09T19:03:12.803172361Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:03:12.803249 env[1319]: time="2024-02-09T19:03:12.803215561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803249 env[1319]: time="2024-02-09T19:03:12.803236661Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:03:12.803329 env[1319]: time="2024-02-09T19:03:12.803291662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803329 env[1319]: time="2024-02-09T19:03:12.803312562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803397 env[1319]: time="2024-02-09T19:03:12.803334062Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803397 env[1319]: time="2024-02-09T19:03:12.803352062Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803397 env[1319]: time="2024-02-09T19:03:12.803369362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803397 env[1319]: time="2024-02-09T19:03:12.803387662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803532 env[1319]: time="2024-02-09T19:03:12.803404462Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803532 env[1319]: time="2024-02-09T19:03:12.803420862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803532 env[1319]: time="2024-02-09T19:03:12.803440762Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803592862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803614162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803634062Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803652462Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803672262Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:03:12.803700 env[1319]: time="2024-02-09T19:03:12.803689362Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:03:12.803934 env[1319]: time="2024-02-09T19:03:12.803717762Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:03:12.803934 env[1319]: time="2024-02-09T19:03:12.803758763Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:03:12.804121 env[1319]: time="2024-02-09T19:03:12.804051763Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.804142663Z" level=info msg="Connect containerd service" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.804189863Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.804828865Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.805356766Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.805405666Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.805464866Z" level=info msg="containerd successfully booted in 0.191473s" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807677771Z" level=info msg="Start subscribing containerd event" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807736071Z" level=info msg="Start recovering state" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807802271Z" level=info msg="Start event monitor" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807829771Z" level=info msg="Start snapshots syncer" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807852771Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:03:12.814785 env[1319]: time="2024-02-09T19:03:12.807866171Z" level=info msg="Start streaming server" Feb 9 19:03:12.815283 tar[1311]: ./ptp Feb 9 19:03:12.805546 systemd[1]: Started containerd.service. Feb 9 19:03:12.908240 tar[1311]: ./vlan Feb 9 19:03:13.009812 tar[1311]: ./host-device Feb 9 19:03:13.107596 tar[1311]: ./tuning Feb 9 19:03:13.192925 tar[1311]: ./vrf Feb 9 19:03:13.279456 tar[1311]: ./sbr Feb 9 19:03:13.359876 tar[1311]: ./tap Feb 9 19:03:13.419765 sshd_keygen[1308]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:03:13.452033 tar[1311]: ./dhcp Feb 9 19:03:13.484979 systemd[1]: Finished sshd-keygen.service. Feb 9 19:03:13.490142 systemd[1]: Starting issuegen.service... Feb 9 19:03:13.495503 systemd[1]: Started waagent.service. Feb 9 19:03:13.501754 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:03:13.501986 systemd[1]: Finished issuegen.service. Feb 9 19:03:13.506419 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:03:13.538377 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:03:13.552261 systemd[1]: Started getty@tty1.service. Feb 9 19:03:13.558330 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:03:13.561467 systemd[1]: Reached target getty.target. Feb 9 19:03:13.651453 tar[1311]: ./static Feb 9 19:03:13.690446 tar[1311]: ./firewall Feb 9 19:03:13.732397 tar[1313]: linux-amd64/LICENSE Feb 9 19:03:13.732944 tar[1313]: linux-amd64/README.md Feb 9 19:03:13.742273 systemd[1]: Finished prepare-helm.service. Feb 9 19:03:13.751094 tar[1311]: ./macvlan Feb 9 19:03:13.762984 systemd[1]: Finished prepare-critools.service. Feb 9 19:03:13.795876 tar[1311]: ./dummy Feb 9 19:03:13.832702 tar[1311]: ./bridge Feb 9 19:03:13.872340 tar[1311]: ./ipvlan Feb 9 19:03:13.910599 tar[1311]: ./portmap Feb 9 19:03:13.946941 tar[1311]: ./host-local Feb 9 19:03:13.999499 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:03:14.002420 systemd[1]: Reached target multi-user.target. Feb 9 19:03:14.006265 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:03:14.017086 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:03:14.017293 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:03:14.020301 systemd[1]: Startup finished in 617ms (firmware) + 7.650s (loader) + 1.062s (kernel) + 11.077s (initrd) + 10.755s (userspace) = 31.163s. Feb 9 19:03:14.131781 login[1395]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:03:14.133542 login[1396]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:03:14.149509 systemd[1]: Created slice user-500.slice. Feb 9 19:03:14.151837 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:03:14.163908 systemd-logind[1303]: New session 1 of user core. Feb 9 19:03:14.167409 systemd-logind[1303]: New session 2 of user core. Feb 9 19:03:14.172291 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:03:14.174436 systemd[1]: Starting user@500.service... Feb 9 19:03:14.182391 (systemd)[1407]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:03:14.229267 locksmithd[1370]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:03:14.328184 systemd[1407]: Queued start job for default target default.target. Feb 9 19:03:14.328900 systemd[1407]: Reached target paths.target. Feb 9 19:03:14.328930 systemd[1407]: Reached target sockets.target. Feb 9 19:03:14.328946 systemd[1407]: Reached target timers.target. Feb 9 19:03:14.328959 systemd[1407]: Reached target basic.target. Feb 9 19:03:14.329094 systemd[1]: Started user@500.service. Feb 9 19:03:14.330391 systemd[1]: Started session-1.scope. Feb 9 19:03:14.331248 systemd[1]: Started session-2.scope. Feb 9 19:03:14.331608 systemd[1407]: Reached target default.target. Feb 9 19:03:14.331666 systemd[1407]: Startup finished in 141ms. Feb 9 19:03:15.548994 waagent[1390]: 2024-02-09T19:03:15.548869Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 19:03:15.557375 waagent[1390]: 2024-02-09T19:03:15.557276Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 19:03:15.560720 waagent[1390]: 2024-02-09T19:03:15.560639Z INFO Daemon Daemon Python: 3.9.16 Feb 9 19:03:15.563907 waagent[1390]: 2024-02-09T19:03:15.563816Z INFO Daemon Daemon Run daemon Feb 9 19:03:15.567103 waagent[1390]: 2024-02-09T19:03:15.566781Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 19:03:15.584708 waagent[1390]: 2024-02-09T19:03:15.584539Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:03:15.592529 waagent[1390]: 2024-02-09T19:03:15.592410Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.592852Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.593719Z INFO Daemon Daemon Using waagent for provisioning Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.595210Z INFO Daemon Daemon Activate resource disk Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.596046Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.603810Z INFO Daemon Daemon Found device: None Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.604960Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.606372Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.608226Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.609370Z INFO Daemon Daemon Running default provisioning handler Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.619369Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.622100Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.623038Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:03:15.639824 waagent[1390]: 2024-02-09T19:03:15.623907Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 19:03:15.667414 waagent[1390]: 2024-02-09T19:03:15.666684Z INFO Daemon Daemon Successfully mounted dvd Feb 9 19:03:15.726401 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 19:03:15.734539 waagent[1390]: 2024-02-09T19:03:15.734406Z INFO Daemon Daemon Detect protocol endpoint Feb 9 19:03:15.750277 waagent[1390]: 2024-02-09T19:03:15.735003Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:03:15.750277 waagent[1390]: 2024-02-09T19:03:15.736149Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 19:03:15.750277 waagent[1390]: 2024-02-09T19:03:15.737096Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 19:03:15.750277 waagent[1390]: 2024-02-09T19:03:15.738291Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 19:03:15.750277 waagent[1390]: 2024-02-09T19:03:15.739129Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 19:03:15.765964 waagent[1390]: 2024-02-09T19:03:15.765895Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 19:03:15.774430 waagent[1390]: 2024-02-09T19:03:15.766826Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 19:03:15.774430 waagent[1390]: 2024-02-09T19:03:15.767909Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 19:03:16.219585 waagent[1390]: 2024-02-09T19:03:16.219412Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 19:03:16.229516 waagent[1390]: 2024-02-09T19:03:16.229419Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 19:03:16.235288 waagent[1390]: 2024-02-09T19:03:16.230075Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 19:03:16.307420 waagent[1390]: 2024-02-09T19:03:16.307275Z INFO Daemon Daemon Found private key matching thumbprint 5BFFB40BB67CD3C0D1D9263ACF4EE4409BFB834E Feb 9 19:03:16.312763 waagent[1390]: 2024-02-09T19:03:16.312670Z INFO Daemon Daemon Certificate with thumbprint 63FF6776617257ADDFF954DF02EA142B27D35092 has no matching private key. Feb 9 19:03:16.319635 waagent[1390]: 2024-02-09T19:03:16.319542Z INFO Daemon Daemon Fetch goal state completed Feb 9 19:03:16.345038 waagent[1390]: 2024-02-09T19:03:16.344955Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 371424ac-51a8-463d-af06-dc160cc06677 New eTag: 12884636966592119332] Feb 9 19:03:16.352355 waagent[1390]: 2024-02-09T19:03:16.345963Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:03:16.356347 waagent[1390]: 2024-02-09T19:03:16.356283Z INFO Daemon Daemon Starting provisioning Feb 9 19:03:16.363817 waagent[1390]: 2024-02-09T19:03:16.356652Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 19:03:16.363817 waagent[1390]: 2024-02-09T19:03:16.357651Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-dbdb6b501f] Feb 9 19:03:16.365451 waagent[1390]: 2024-02-09T19:03:16.365335Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-dbdb6b501f] Feb 9 19:03:16.373897 waagent[1390]: 2024-02-09T19:03:16.366095Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 19:03:16.373897 waagent[1390]: 2024-02-09T19:03:16.367306Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 19:03:16.381125 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 19:03:16.381360 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 19:03:16.381444 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 19:03:16.381831 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:03:16.384898 systemd-networkd[1167]: eth0: DHCPv6 lease lost Feb 9 19:03:16.386315 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:03:16.386478 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:03:16.388993 systemd[1]: Starting systemd-networkd.service... Feb 9 19:03:16.420644 systemd-networkd[1450]: enP51414s1: Link UP Feb 9 19:03:16.420655 systemd-networkd[1450]: enP51414s1: Gained carrier Feb 9 19:03:16.422062 systemd-networkd[1450]: eth0: Link UP Feb 9 19:03:16.422071 systemd-networkd[1450]: eth0: Gained carrier Feb 9 19:03:16.422517 systemd-networkd[1450]: lo: Link UP Feb 9 19:03:16.422527 systemd-networkd[1450]: lo: Gained carrier Feb 9 19:03:16.422854 systemd-networkd[1450]: eth0: Gained IPv6LL Feb 9 19:03:16.423140 systemd-networkd[1450]: Enumeration completed Feb 9 19:03:16.433405 waagent[1390]: 2024-02-09T19:03:16.424666Z INFO Daemon Daemon Create user account if not exists Feb 9 19:03:16.433405 waagent[1390]: 2024-02-09T19:03:16.431603Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 19:03:16.433405 waagent[1390]: 2024-02-09T19:03:16.432021Z INFO Daemon Daemon Configure sudoer Feb 9 19:03:16.423270 systemd[1]: Started systemd-networkd.service. Feb 9 19:03:16.428829 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:03:16.436860 waagent[1390]: 2024-02-09T19:03:16.434007Z INFO Daemon Daemon Configure sshd Feb 9 19:03:16.436860 waagent[1390]: 2024-02-09T19:03:16.434972Z INFO Daemon Daemon Deploy ssh public key. Feb 9 19:03:16.442053 systemd-networkd[1450]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:03:16.479979 systemd-networkd[1450]: eth0: DHCPv4 address 10.200.8.31/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:03:16.482695 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:03:46.754225 waagent[1390]: 2024-02-09T19:03:46.754107Z INFO Daemon Daemon Provisioning complete Feb 9 19:03:46.774501 waagent[1390]: 2024-02-09T19:03:46.774410Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 19:03:46.778441 waagent[1390]: 2024-02-09T19:03:46.778346Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 19:03:46.784645 waagent[1390]: 2024-02-09T19:03:46.784549Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 19:03:47.056367 waagent[1462]: 2024-02-09T19:03:47.056178Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 19:03:47.057127 waagent[1462]: 2024-02-09T19:03:47.057054Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:47.057281 waagent[1462]: 2024-02-09T19:03:47.057223Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:47.069160 waagent[1462]: 2024-02-09T19:03:47.069083Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 19:03:47.069349 waagent[1462]: 2024-02-09T19:03:47.069291Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 19:03:47.134017 waagent[1462]: 2024-02-09T19:03:47.133877Z INFO ExtHandler ExtHandler Found private key matching thumbprint 5BFFB40BB67CD3C0D1D9263ACF4EE4409BFB834E Feb 9 19:03:47.134278 waagent[1462]: 2024-02-09T19:03:47.134205Z INFO ExtHandler ExtHandler Certificate with thumbprint 63FF6776617257ADDFF954DF02EA142B27D35092 has no matching private key. Feb 9 19:03:47.134527 waagent[1462]: 2024-02-09T19:03:47.134476Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 19:03:47.153684 waagent[1462]: 2024-02-09T19:03:47.153607Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: e0294546-7ae1-4085-bc46-985b8d795caf New eTag: 12884636966592119332] Feb 9 19:03:47.154397 waagent[1462]: 2024-02-09T19:03:47.154328Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:03:47.199638 waagent[1462]: 2024-02-09T19:03:47.199490Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:03:47.212387 waagent[1462]: 2024-02-09T19:03:47.212284Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1462 Feb 9 19:03:47.215965 waagent[1462]: 2024-02-09T19:03:47.215891Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:03:47.217242 waagent[1462]: 2024-02-09T19:03:47.217176Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:03:47.245669 waagent[1462]: 2024-02-09T19:03:47.245600Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:03:47.246224 waagent[1462]: 2024-02-09T19:03:47.246154Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:03:47.254794 waagent[1462]: 2024-02-09T19:03:47.254734Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:03:47.255330 waagent[1462]: 2024-02-09T19:03:47.255267Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:03:47.256432 waagent[1462]: 2024-02-09T19:03:47.256367Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 19:03:47.257739 waagent[1462]: 2024-02-09T19:03:47.257679Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:03:47.258205 waagent[1462]: 2024-02-09T19:03:47.258148Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:47.258361 waagent[1462]: 2024-02-09T19:03:47.258313Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:47.258921 waagent[1462]: 2024-02-09T19:03:47.258836Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:03:47.259462 waagent[1462]: 2024-02-09T19:03:47.259406Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:03:47.259672 waagent[1462]: 2024-02-09T19:03:47.259617Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:47.260131 waagent[1462]: 2024-02-09T19:03:47.260064Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:47.260361 waagent[1462]: 2024-02-09T19:03:47.260301Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:03:47.260361 waagent[1462]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:03:47.260361 waagent[1462]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:03:47.260361 waagent[1462]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:03:47.260361 waagent[1462]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:47.260361 waagent[1462]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:47.260361 waagent[1462]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:47.261024 waagent[1462]: 2024-02-09T19:03:47.260964Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:03:47.261225 waagent[1462]: 2024-02-09T19:03:47.261173Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:03:47.261874 waagent[1462]: 2024-02-09T19:03:47.261791Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:03:47.262259 waagent[1462]: 2024-02-09T19:03:47.262207Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:03:47.264628 waagent[1462]: 2024-02-09T19:03:47.264394Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:03:47.266656 waagent[1462]: 2024-02-09T19:03:47.266597Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:03:47.266750 waagent[1462]: 2024-02-09T19:03:47.266689Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:03:47.267053 waagent[1462]: 2024-02-09T19:03:47.267004Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:03:47.283356 waagent[1462]: 2024-02-09T19:03:47.283263Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 19:03:47.284418 waagent[1462]: 2024-02-09T19:03:47.284360Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:03:47.287671 waagent[1462]: 2024-02-09T19:03:47.287607Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1450' Feb 9 19:03:47.292994 waagent[1462]: 2024-02-09T19:03:47.292876Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 19:03:47.307516 waagent[1462]: 2024-02-09T19:03:47.307402Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:03:47.307516 waagent[1462]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:03:47.307516 waagent[1462]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:03:47.307516 waagent[1462]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e9:82 brd ff:ff:ff:ff:ff:ff Feb 9 19:03:47.307516 waagent[1462]: 3: enP51414s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e9:82 brd ff:ff:ff:ff:ff:ff\ altname enP51414p0s2 Feb 9 19:03:47.307516 waagent[1462]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:03:47.307516 waagent[1462]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:03:47.307516 waagent[1462]: 2: eth0 inet 10.200.8.31/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:03:47.307516 waagent[1462]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:03:47.307516 waagent[1462]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:03:47.307516 waagent[1462]: 2: eth0 inet6 fe80::20d:3aff:fed7:e982/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:03:47.353790 waagent[1462]: 2024-02-09T19:03:47.353718Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 19:03:47.445552 waagent[1462]: 2024-02-09T19:03:47.445420Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 19:03:47.449391 waagent[1462]: 2024-02-09T19:03:47.449280Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 19:03:47.449391 waagent[1462]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:47.449391 waagent[1462]: pkts bytes target prot opt in out source destination Feb 9 19:03:47.449391 waagent[1462]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:47.449391 waagent[1462]: pkts bytes target prot opt in out source destination Feb 9 19:03:47.449391 waagent[1462]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:47.449391 waagent[1462]: pkts bytes target prot opt in out source destination Feb 9 19:03:47.449391 waagent[1462]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:03:47.449391 waagent[1462]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:03:47.451610 waagent[1462]: 2024-02-09T19:03:47.451547Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 19:03:47.677214 waagent[1462]: 2024-02-09T19:03:47.677133Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 19:03:47.788528 waagent[1390]: 2024-02-09T19:03:47.788316Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 19:03:47.794455 waagent[1390]: 2024-02-09T19:03:47.794381Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 19:03:48.795653 waagent[1500]: 2024-02-09T19:03:48.795532Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 19:03:48.796399 waagent[1500]: 2024-02-09T19:03:48.796329Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 19:03:48.796547 waagent[1500]: 2024-02-09T19:03:48.796493Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 19:03:48.806164 waagent[1500]: 2024-02-09T19:03:48.806056Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:03:48.806557 waagent[1500]: 2024-02-09T19:03:48.806499Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:48.806721 waagent[1500]: 2024-02-09T19:03:48.806672Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:48.818960 waagent[1500]: 2024-02-09T19:03:48.818884Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 19:03:48.828585 waagent[1500]: 2024-02-09T19:03:48.828518Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 19:03:48.829575 waagent[1500]: 2024-02-09T19:03:48.829511Z INFO ExtHandler Feb 9 19:03:48.829727 waagent[1500]: 2024-02-09T19:03:48.829677Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: c98c772d-dd27-4aab-9c3f-f4d0ada3168a eTag: 12884636966592119332 source: Fabric] Feb 9 19:03:48.830453 waagent[1500]: 2024-02-09T19:03:48.830394Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 19:03:48.831551 waagent[1500]: 2024-02-09T19:03:48.831491Z INFO ExtHandler Feb 9 19:03:48.831687 waagent[1500]: 2024-02-09T19:03:48.831636Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 19:03:48.839261 waagent[1500]: 2024-02-09T19:03:48.839207Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 19:03:48.839703 waagent[1500]: 2024-02-09T19:03:48.839654Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:03:48.866115 waagent[1500]: 2024-02-09T19:03:48.866015Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 19:03:48.934704 waagent[1500]: 2024-02-09T19:03:48.934553Z INFO ExtHandler Downloaded certificate {'thumbprint': '63FF6776617257ADDFF954DF02EA142B27D35092', 'hasPrivateKey': False} Feb 9 19:03:48.935780 waagent[1500]: 2024-02-09T19:03:48.935705Z INFO ExtHandler Downloaded certificate {'thumbprint': '5BFFB40BB67CD3C0D1D9263ACF4EE4409BFB834E', 'hasPrivateKey': True} Feb 9 19:03:48.936780 waagent[1500]: 2024-02-09T19:03:48.936718Z INFO ExtHandler Fetch goal state completed Feb 9 19:03:48.961116 waagent[1500]: 2024-02-09T19:03:48.961026Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1500 Feb 9 19:03:48.964456 waagent[1500]: 2024-02-09T19:03:48.964380Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:03:48.965934 waagent[1500]: 2024-02-09T19:03:48.965871Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:03:48.971067 waagent[1500]: 2024-02-09T19:03:48.971012Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:03:48.971445 waagent[1500]: 2024-02-09T19:03:48.971387Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:03:48.979617 waagent[1500]: 2024-02-09T19:03:48.979562Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:03:48.980110 waagent[1500]: 2024-02-09T19:03:48.980051Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:03:48.998738 waagent[1500]: 2024-02-09T19:03:48.998582Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 19:03:49.002142 waagent[1500]: 2024-02-09T19:03:49.002012Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 19:03:49.007139 waagent[1500]: 2024-02-09T19:03:49.007064Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 19:03:49.008728 waagent[1500]: 2024-02-09T19:03:49.008660Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:03:49.008957 waagent[1500]: 2024-02-09T19:03:49.008898Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:49.009451 waagent[1500]: 2024-02-09T19:03:49.009389Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:49.010059 waagent[1500]: 2024-02-09T19:03:49.009997Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:03:49.010524 waagent[1500]: 2024-02-09T19:03:49.010464Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:03:49.011341 waagent[1500]: 2024-02-09T19:03:49.011204Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:03:49.011678 waagent[1500]: 2024-02-09T19:03:49.011618Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:03:49.011678 waagent[1500]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:03:49.011678 waagent[1500]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:03:49.011678 waagent[1500]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:03:49.011678 waagent[1500]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:49.011678 waagent[1500]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:49.011678 waagent[1500]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:03:49.012447 waagent[1500]: 2024-02-09T19:03:49.012391Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:03:49.015505 waagent[1500]: 2024-02-09T19:03:49.015417Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:03:49.015878 waagent[1500]: 2024-02-09T19:03:49.015789Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:03:49.015878 waagent[1500]: 2024-02-09T19:03:49.015670Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:03:49.016436 waagent[1500]: 2024-02-09T19:03:49.016384Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:03:49.017349 waagent[1500]: 2024-02-09T19:03:49.017278Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:03:49.018084 waagent[1500]: 2024-02-09T19:03:49.018026Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:03:49.019569 waagent[1500]: 2024-02-09T19:03:49.019509Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:03:49.022448 waagent[1500]: 2024-02-09T19:03:49.022357Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:03:49.046715 waagent[1500]: 2024-02-09T19:03:49.046564Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 19:03:49.047404 waagent[1500]: 2024-02-09T19:03:49.047341Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 19:03:49.048521 waagent[1500]: 2024-02-09T19:03:49.047725Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:03:49.048521 waagent[1500]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:03:49.048521 waagent[1500]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:03:49.048521 waagent[1500]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e9:82 brd ff:ff:ff:ff:ff:ff Feb 9 19:03:49.048521 waagent[1500]: 3: enP51414s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:d7:e9:82 brd ff:ff:ff:ff:ff:ff\ altname enP51414p0s2 Feb 9 19:03:49.048521 waagent[1500]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:03:49.048521 waagent[1500]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:03:49.048521 waagent[1500]: 2: eth0 inet 10.200.8.31/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:03:49.048521 waagent[1500]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:03:49.048521 waagent[1500]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:03:49.048521 waagent[1500]: 2: eth0 inet6 fe80::20d:3aff:fed7:e982/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:03:49.106146 waagent[1500]: 2024-02-09T19:03:49.106013Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 19:03:49.106146 waagent[1500]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:49.106146 waagent[1500]: pkts bytes target prot opt in out source destination Feb 9 19:03:49.106146 waagent[1500]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:49.106146 waagent[1500]: pkts bytes target prot opt in out source destination Feb 9 19:03:49.106146 waagent[1500]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:03:49.106146 waagent[1500]: pkts bytes target prot opt in out source destination Feb 9 19:03:49.106146 waagent[1500]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:03:49.106146 waagent[1500]: 159 18085 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:03:49.106146 waagent[1500]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:03:49.127743 waagent[1500]: 2024-02-09T19:03:49.127677Z INFO ExtHandler ExtHandler Feb 9 19:03:49.128144 waagent[1500]: 2024-02-09T19:03:49.128081Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e48677d6-7850-4677-aa78-8eccd65dde2f correlation d6ebf621-e358-4dd4-a30e-2c570351e20a created: 2024-02-09T19:02:31.811920Z] Feb 9 19:03:49.129031 waagent[1500]: 2024-02-09T19:03:49.128969Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 19:03:49.130767 waagent[1500]: 2024-02-09T19:03:49.130707Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 19:03:49.153001 waagent[1500]: 2024-02-09T19:03:49.152910Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 19:03:49.163444 waagent[1500]: 2024-02-09T19:03:49.163353Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 6B09F669-AFFF-4DD3-8DAF-BEBCB4D88641;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 19:03:57.162768 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 9 19:03:58.132122 update_engine[1304]: I0209 19:03:58.132046 1304 update_attempter.cc:509] Updating boot flags... Feb 9 19:04:09.375551 systemd[1]: Created slice system-sshd.slice. Feb 9 19:04:09.377537 systemd[1]: Started sshd@0-10.200.8.31:22-10.200.12.6:51492.service. Feb 9 19:04:10.035221 sshd[1638]: Accepted publickey for core from 10.200.12.6 port 51492 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:10.037026 sshd[1638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:10.041322 systemd-logind[1303]: New session 3 of user core. Feb 9 19:04:10.043016 systemd[1]: Started session-3.scope. Feb 9 19:04:10.574559 systemd[1]: Started sshd@1-10.200.8.31:22-10.200.12.6:51498.service. Feb 9 19:04:11.197610 sshd[1643]: Accepted publickey for core from 10.200.12.6 port 51498 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:11.199353 sshd[1643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:11.205193 systemd[1]: Started session-4.scope. Feb 9 19:04:11.205943 systemd-logind[1303]: New session 4 of user core. Feb 9 19:04:11.644357 sshd[1643]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:11.647872 systemd[1]: sshd@1-10.200.8.31:22-10.200.12.6:51498.service: Deactivated successfully. Feb 9 19:04:11.648969 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:04:11.649698 systemd-logind[1303]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:04:11.650629 systemd-logind[1303]: Removed session 4. Feb 9 19:04:11.747958 systemd[1]: Started sshd@2-10.200.8.31:22-10.200.12.6:51504.service. Feb 9 19:04:12.361180 sshd[1649]: Accepted publickey for core from 10.200.12.6 port 51504 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:12.363282 sshd[1649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:12.368158 systemd[1]: Started session-5.scope. Feb 9 19:04:12.368605 systemd-logind[1303]: New session 5 of user core. Feb 9 19:04:12.793217 sshd[1649]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:12.797595 systemd[1]: sshd@2-10.200.8.31:22-10.200.12.6:51504.service: Deactivated successfully. Feb 9 19:04:12.798771 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:04:12.799774 systemd-logind[1303]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:04:12.800743 systemd-logind[1303]: Removed session 5. Feb 9 19:04:12.898648 systemd[1]: Started sshd@3-10.200.8.31:22-10.200.12.6:51506.service. Feb 9 19:04:13.521313 sshd[1655]: Accepted publickey for core from 10.200.12.6 port 51506 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:13.523116 sshd[1655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:13.528776 systemd[1]: Started session-6.scope. Feb 9 19:04:13.529439 systemd-logind[1303]: New session 6 of user core. Feb 9 19:04:13.961762 sshd[1655]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:13.965086 systemd[1]: sshd@3-10.200.8.31:22-10.200.12.6:51506.service: Deactivated successfully. Feb 9 19:04:13.966349 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:04:13.966373 systemd-logind[1303]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:04:13.967446 systemd-logind[1303]: Removed session 6. Feb 9 19:04:14.068321 systemd[1]: Started sshd@4-10.200.8.31:22-10.200.12.6:51516.service. Feb 9 19:04:14.687207 sshd[1661]: Accepted publickey for core from 10.200.12.6 port 51516 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:14.688983 sshd[1661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:14.698454 systemd[1]: Started session-7.scope. Feb 9 19:04:14.700836 systemd-logind[1303]: New session 7 of user core. Feb 9 19:04:15.082521 sudo[1664]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:04:15.082799 sudo[1664]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:04:15.093077 dbus-daemon[1286]: \xd0\xfd\xabP\xb9U: received setenforce notice (enforcing=2019903472) Feb 9 19:04:15.094970 sudo[1664]: pam_unix(sudo:session): session closed for user root Feb 9 19:04:15.197711 sshd[1661]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:15.201709 systemd[1]: sshd@4-10.200.8.31:22-10.200.12.6:51516.service: Deactivated successfully. Feb 9 19:04:15.202939 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:04:15.203742 systemd-logind[1303]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:04:15.204708 systemd-logind[1303]: Removed session 7. Feb 9 19:04:15.302681 systemd[1]: Started sshd@5-10.200.8.31:22-10.200.12.6:51526.service. Feb 9 19:04:15.924268 sshd[1668]: Accepted publickey for core from 10.200.12.6 port 51526 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:15.926075 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:15.930965 systemd-logind[1303]: New session 8 of user core. Feb 9 19:04:15.931413 systemd[1]: Started session-8.scope. Feb 9 19:04:16.266108 sudo[1672]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:04:16.266828 sudo[1672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:04:16.269751 sudo[1672]: pam_unix(sudo:session): session closed for user root Feb 9 19:04:16.274599 sudo[1671]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:04:16.274903 sudo[1671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:04:16.284203 systemd[1]: Stopping audit-rules.service... Feb 9 19:04:16.284000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:04:16.286101 auditctl[1675]: No rules Feb 9 19:04:16.289578 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 19:04:16.289648 kernel: audit: type=1305 audit(1707505456.284:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:04:16.286522 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:04:16.286685 systemd[1]: Stopped audit-rules.service. Feb 9 19:04:16.289318 systemd[1]: Starting audit-rules.service... Feb 9 19:04:16.284000 audit[1675]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd656b7220 a2=420 a3=0 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:16.310678 augenrules[1692]: No rules Feb 9 19:04:16.311589 systemd[1]: Finished audit-rules.service. Feb 9 19:04:16.312704 sudo[1671]: pam_unix(sudo:session): session closed for user root Feb 9 19:04:16.284000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:04:16.316880 kernel: audit: type=1300 audit(1707505456.284:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd656b7220 a2=420 a3=0 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:16.316928 kernel: audit: type=1327 audit(1707505456.284:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:04:16.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.322218 kernel: audit: type=1131 audit(1707505456.284:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.332863 kernel: audit: type=1130 audit(1707505456.310:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.310000 audit[1671]: USER_END pid=1671 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.357216 kernel: audit: type=1106 audit(1707505456.310:170): pid=1671 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.310000 audit[1671]: CRED_DISP pid=1671 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.357861 kernel: audit: type=1104 audit(1707505456.310:171): pid=1671 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.413310 sshd[1668]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:16.414000 audit[1668]: USER_END pid=1668 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:16.417079 systemd[1]: sshd@5-10.200.8.31:22-10.200.12.6:51526.service: Deactivated successfully. Feb 9 19:04:16.418147 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:04:16.419858 systemd-logind[1303]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:04:16.420928 systemd-logind[1303]: Removed session 8. Feb 9 19:04:16.414000 audit[1668]: CRED_DISP pid=1668 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:16.449788 kernel: audit: type=1106 audit(1707505456.414:172): pid=1668 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:16.450434 kernel: audit: type=1104 audit(1707505456.414:173): pid=1668 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:16.450476 kernel: audit: type=1131 audit(1707505456.416:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.31:22-10.200.12.6:51526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.31:22-10.200.12.6:51526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:16.519362 systemd[1]: Started sshd@6-10.200.8.31:22-10.200.12.6:51530.service. Feb 9 19:04:16.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.31:22-10.200.12.6:51530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:17.150000 audit[1698]: USER_ACCT pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:17.152087 sshd[1698]: Accepted publickey for core from 10.200.12.6 port 51530 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:04:17.152000 audit[1698]: CRED_ACQ pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:17.152000 audit[1698]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe93c205b0 a2=3 a3=0 items=0 ppid=1 pid=1698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:17.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:04:17.153833 sshd[1698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:04:17.158803 systemd[1]: Started session-9.scope. Feb 9 19:04:17.159418 systemd-logind[1303]: New session 9 of user core. Feb 9 19:04:17.162000 audit[1698]: USER_START pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:17.164000 audit[1700]: CRED_ACQ pid=1700 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:17.491000 audit[1701]: USER_ACCT pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:17.491000 audit[1701]: CRED_REFR pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:17.493000 audit[1701]: USER_START pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:17.492658 sudo[1701]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:04:17.492935 sudo[1701]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:04:18.104552 systemd[1]: Starting docker.service... Feb 9 19:04:18.148866 env[1716]: time="2024-02-09T19:04:18.148799028Z" level=info msg="Starting up" Feb 9 19:04:18.150237 env[1716]: time="2024-02-09T19:04:18.150208370Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:04:18.150237 env[1716]: time="2024-02-09T19:04:18.150227471Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:04:18.150470 env[1716]: time="2024-02-09T19:04:18.150250672Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:04:18.150470 env[1716]: time="2024-02-09T19:04:18.150263572Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:04:18.152294 env[1716]: time="2024-02-09T19:04:18.152260332Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:04:18.152294 env[1716]: time="2024-02-09T19:04:18.152279632Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:04:18.152447 env[1716]: time="2024-02-09T19:04:18.152297333Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:04:18.152447 env[1716]: time="2024-02-09T19:04:18.152309433Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:04:18.158659 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4271486455-merged.mount: Deactivated successfully. Feb 9 19:04:18.194891 env[1716]: time="2024-02-09T19:04:18.194821400Z" level=info msg="Loading containers: start." Feb 9 19:04:18.219000 audit[1743]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.219000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdde6e7e20 a2=0 a3=7ffdde6e7e0c items=0 ppid=1716 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:04:18.221000 audit[1745]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.221000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb9aa21a0 a2=0 a3=7ffeb9aa218c items=0 ppid=1716 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.221000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:04:18.223000 audit[1747]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.223000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefb1cdb60 a2=0 a3=7ffefb1cdb4c items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.223000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:04:18.225000 audit[1749]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.225000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc0014a430 a2=0 a3=7ffc0014a41c items=0 ppid=1716 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:04:18.227000 audit[1751]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.227000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca4207bc0 a2=0 a3=7ffca4207bac items=0 ppid=1716 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:04:18.229000 audit[1753]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.229000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff337612d0 a2=0 a3=7fff337612bc items=0 ppid=1716 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:04:18.245000 audit[1755]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.245000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeedbcbb10 a2=0 a3=7ffeedbcbafc items=0 ppid=1716 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.245000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:04:18.247000 audit[1757]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.247000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe5c6aea90 a2=0 a3=7ffe5c6aea7c items=0 ppid=1716 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:04:18.249000 audit[1759]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.249000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffd97e3e60 a2=0 a3=7fffd97e3e4c items=0 ppid=1716 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:04:18.263000 audit[1763]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.263000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff32722b70 a2=0 a3=7fff32722b5c items=0 ppid=1716 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:04:18.264000 audit[1764]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.264000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd2f1cf210 a2=0 a3=7ffd2f1cf1fc items=0 ppid=1716 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:04:18.277869 kernel: Initializing XFRM netlink socket Feb 9 19:04:18.291920 env[1716]: time="2024-02-09T19:04:18.291877491Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:04:18.328000 audit[1772]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.328000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe54d7f7d0 a2=0 a3=7ffe54d7f7bc items=0 ppid=1716 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:04:18.339000 audit[1775]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.339000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc2cb3c8a0 a2=0 a3=7ffc2cb3c88c items=0 ppid=1716 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:04:18.342000 audit[1778]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.342000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff183ed410 a2=0 a3=7fff183ed3fc items=0 ppid=1716 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:04:18.344000 audit[1780]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.344000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff6cb2e3f0 a2=0 a3=7fff6cb2e3dc items=0 ppid=1716 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:04:18.346000 audit[1782]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.346000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff2d60f1f0 a2=0 a3=7fff2d60f1dc items=0 ppid=1716 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:04:18.348000 audit[1784]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.348000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffb2ca1f40 a2=0 a3=7fffb2ca1f2c items=0 ppid=1716 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:04:18.350000 audit[1786]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.350000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffec9d27e30 a2=0 a3=7ffec9d27e1c items=0 ppid=1716 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:04:18.352000 audit[1788]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.352000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd73559f10 a2=0 a3=7ffd73559efc items=0 ppid=1716 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:04:18.354000 audit[1790]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.354000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa2416190 a2=0 a3=7fffa241617c items=0 ppid=1716 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:04:18.357000 audit[1792]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.357000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe91ab6a90 a2=0 a3=7ffe91ab6a7c items=0 ppid=1716 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:04:18.359000 audit[1794]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.359000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffee06da0b0 a2=0 a3=7ffee06da09c items=0 ppid=1716 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:04:18.360432 systemd-networkd[1450]: docker0: Link UP Feb 9 19:04:18.376000 audit[1798]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.376000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe287c5e10 a2=0 a3=7ffe287c5dfc items=0 ppid=1716 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:04:18.377000 audit[1799]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:18.377000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffe61539d0 a2=0 a3=7fffe61539bc items=0 ppid=1716 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:18.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:04:18.378427 env[1716]: time="2024-02-09T19:04:18.378393068Z" level=info msg="Loading containers: done." Feb 9 19:04:18.390017 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4278961932-merged.mount: Deactivated successfully. Feb 9 19:04:18.416988 env[1716]: time="2024-02-09T19:04:18.416930316Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:04:18.417226 env[1716]: time="2024-02-09T19:04:18.417186424Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:04:18.417349 env[1716]: time="2024-02-09T19:04:18.417324328Z" level=info msg="Daemon has completed initialization" Feb 9 19:04:18.442038 systemd[1]: Started docker.service. Feb 9 19:04:18.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:18.452468 env[1716]: time="2024-02-09T19:04:18.452402273Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:04:18.470500 systemd[1]: Reloading. Feb 9 19:04:18.550533 /usr/lib/systemd/system-generators/torcx-generator[1847]: time="2024-02-09T19:04:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:04:18.550577 /usr/lib/systemd/system-generators/torcx-generator[1847]: time="2024-02-09T19:04:18Z" level=info msg="torcx already run" Feb 9 19:04:18.649109 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:04:18.649131 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:04:18.667962 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:04:18.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.734000 audit: BPF prog-id=32 op=LOAD Feb 9 19:04:18.735000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit: BPF prog-id=33 op=LOAD Feb 9 19:04:18.736000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit: BPF prog-id=34 op=LOAD Feb 9 19:04:18.737000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit: BPF prog-id=35 op=LOAD Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.737000 audit: BPF prog-id=36 op=LOAD Feb 9 19:04:18.737000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:04:18.737000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit: BPF prog-id=37 op=LOAD Feb 9 19:04:18.738000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit: BPF prog-id=38 op=LOAD Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit: BPF prog-id=39 op=LOAD Feb 9 19:04:18.738000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:04:18.738000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit: BPF prog-id=40 op=LOAD Feb 9 19:04:18.739000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit: BPF prog-id=41 op=LOAD Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.739000 audit: BPF prog-id=42 op=LOAD Feb 9 19:04:18.739000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:04:18.739000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.740000 audit: BPF prog-id=43 op=LOAD Feb 9 19:04:18.740000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:04:18.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit: BPF prog-id=44 op=LOAD Feb 9 19:04:18.744000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit: BPF prog-id=45 op=LOAD Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:18.744000 audit: BPF prog-id=46 op=LOAD Feb 9 19:04:18.744000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:04:18.744000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:04:18.757753 systemd[1]: Started kubelet.service. Feb 9 19:04:18.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:18.834564 kubelet[1908]: E0209 19:04:18.834508 1908 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:04:18.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:04:18.836456 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:04:18.836570 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:04:20.437781 env[1319]: time="2024-02-09T19:04:20.437708628Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 19:04:20.985041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3941735291.mount: Deactivated successfully. Feb 9 19:04:23.140918 env[1319]: time="2024-02-09T19:04:23.140855789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:23.146708 env[1319]: time="2024-02-09T19:04:23.146660640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:23.149759 env[1319]: time="2024-02-09T19:04:23.149716419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:23.152934 env[1319]: time="2024-02-09T19:04:23.152900601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:23.153604 env[1319]: time="2024-02-09T19:04:23.153572119Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 9 19:04:23.164403 env[1319]: time="2024-02-09T19:04:23.164365999Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 19:04:25.285496 env[1319]: time="2024-02-09T19:04:25.285437326Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:25.293065 env[1319]: time="2024-02-09T19:04:25.293000511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:25.298303 env[1319]: time="2024-02-09T19:04:25.298256140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:25.305104 env[1319]: time="2024-02-09T19:04:25.305056507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:25.306195 env[1319]: time="2024-02-09T19:04:25.306151934Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 9 19:04:25.319124 env[1319]: time="2024-02-09T19:04:25.319083252Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 19:04:26.630807 env[1319]: time="2024-02-09T19:04:26.630749946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:26.636591 env[1319]: time="2024-02-09T19:04:26.636540985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:26.640753 env[1319]: time="2024-02-09T19:04:26.640716984Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:26.644680 env[1319]: time="2024-02-09T19:04:26.644648378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:26.645310 env[1319]: time="2024-02-09T19:04:26.645278093Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 9 19:04:26.655542 env[1319]: time="2024-02-09T19:04:26.655505138Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 19:04:27.632486 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount241149226.mount: Deactivated successfully. Feb 9 19:04:28.182926 env[1319]: time="2024-02-09T19:04:28.182865069Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.188945 env[1319]: time="2024-02-09T19:04:28.188893005Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.192441 env[1319]: time="2024-02-09T19:04:28.192397685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.195600 env[1319]: time="2024-02-09T19:04:28.195562756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.195935 env[1319]: time="2024-02-09T19:04:28.195903464Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 19:04:28.206351 env[1319]: time="2024-02-09T19:04:28.206302999Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:04:28.652360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1830188996.mount: Deactivated successfully. Feb 9 19:04:28.672761 env[1319]: time="2024-02-09T19:04:28.672704859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.678039 env[1319]: time="2024-02-09T19:04:28.677982678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.681440 env[1319]: time="2024-02-09T19:04:28.681404856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.685273 env[1319]: time="2024-02-09T19:04:28.685239343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:28.685670 env[1319]: time="2024-02-09T19:04:28.685638852Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:04:28.696573 env[1319]: time="2024-02-09T19:04:28.696530498Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 19:04:29.066717 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:04:29.067031 systemd[1]: Stopped kubelet.service. Feb 9 19:04:29.080331 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 19:04:29.080463 kernel: audit: type=1130 audit(1707505469.066:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.075236 systemd[1]: Started kubelet.service. Feb 9 19:04:29.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.096008 kernel: audit: type=1131 audit(1707505469.066:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.096109 kernel: audit: type=1130 audit(1707505469.073:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:29.135567 kubelet[1953]: E0209 19:04:29.135508 1953 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:04:29.138776 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:04:29.138957 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:04:29.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:04:29.153862 kernel: audit: type=1131 audit(1707505469.138:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:04:29.231812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3389694321.mount: Deactivated successfully. Feb 9 19:04:34.112915 env[1319]: time="2024-02-09T19:04:34.112830852Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:34.117513 env[1319]: time="2024-02-09T19:04:34.117459341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:34.120639 env[1319]: time="2024-02-09T19:04:34.120601802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:34.123532 env[1319]: time="2024-02-09T19:04:34.123497358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:34.124399 env[1319]: time="2024-02-09T19:04:34.124363875Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 9 19:04:34.134671 env[1319]: time="2024-02-09T19:04:34.134636973Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:04:34.679192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1913633518.mount: Deactivated successfully. Feb 9 19:04:35.374375 env[1319]: time="2024-02-09T19:04:35.374305940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:35.380323 env[1319]: time="2024-02-09T19:04:35.380272752Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:35.384441 env[1319]: time="2024-02-09T19:04:35.384400130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:35.388022 env[1319]: time="2024-02-09T19:04:35.387981797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:35.388581 env[1319]: time="2024-02-09T19:04:35.388546608Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:04:38.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:38.193226 systemd[1]: Stopped kubelet.service. Feb 9 19:04:38.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:38.220595 systemd[1]: Reloading. Feb 9 19:04:38.221319 kernel: audit: type=1130 audit(1707505478.192:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:38.221436 kernel: audit: type=1131 audit(1707505478.195:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:38.298511 /usr/lib/systemd/system-generators/torcx-generator[2052]: time="2024-02-09T19:04:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:04:38.301029 /usr/lib/systemd/system-generators/torcx-generator[2052]: time="2024-02-09T19:04:38Z" level=info msg="torcx already run" Feb 9 19:04:38.394227 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:04:38.394248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:04:38.412489 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494163 kernel: audit: type=1400 audit(1707505478.477:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.514784 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:04:38.514918 kernel: audit: type=1400 audit(1707505478.477:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.514944 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:04:38.514969 kernel: audit: backlog limit exceeded Feb 9 19:04:38.514996 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.523882 kernel: audit: type=1400 audit(1707505478.477:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.523978 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.492000 audit: BPF prog-id=47 op=LOAD Feb 9 19:04:38.492000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.493000 audit: BPF prog-id=48 op=LOAD Feb 9 19:04:38.493000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.494000 audit: BPF prog-id=49 op=LOAD Feb 9 19:04:38.494000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:04:38.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit: BPF prog-id=50 op=LOAD Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit: BPF prog-id=51 op=LOAD Feb 9 19:04:38.495000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:04:38.495000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit: BPF prog-id=53 op=LOAD Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit: BPF prog-id=54 op=LOAD Feb 9 19:04:38.545000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:04:38.545000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.545000 audit: BPF prog-id=55 op=LOAD Feb 9 19:04:38.545000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit: BPF prog-id=56 op=LOAD Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.546000 audit: BPF prog-id=57 op=LOAD Feb 9 19:04:38.546000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:04:38.546000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.548000 audit: BPF prog-id=58 op=LOAD Feb 9 19:04:38.548000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit: BPF prog-id=59 op=LOAD Feb 9 19:04:38.551000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit: BPF prog-id=60 op=LOAD Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:38.551000 audit: BPF prog-id=61 op=LOAD Feb 9 19:04:38.551000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:04:38.551000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:04:38.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:38.570642 systemd[1]: Started kubelet.service. Feb 9 19:04:38.625730 kubelet[2108]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:04:38.626120 kubelet[2108]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:04:38.626165 kubelet[2108]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:04:38.626281 kubelet[2108]: I0209 19:04:38.626242 2108 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:04:39.073485 kubelet[2108]: I0209 19:04:39.073439 2108 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:04:39.073485 kubelet[2108]: I0209 19:04:39.073472 2108 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:04:39.074391 kubelet[2108]: I0209 19:04:39.074357 2108 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:04:39.081564 kubelet[2108]: E0209 19:04:39.081529 2108 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.31:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.081730 kubelet[2108]: I0209 19:04:39.081607 2108 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:04:39.086818 kubelet[2108]: I0209 19:04:39.086791 2108 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:04:39.087071 kubelet[2108]: I0209 19:04:39.087049 2108 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:04:39.087251 kubelet[2108]: I0209 19:04:39.087232 2108 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:04:39.087391 kubelet[2108]: I0209 19:04:39.087264 2108 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:04:39.087391 kubelet[2108]: I0209 19:04:39.087277 2108 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:04:39.087480 kubelet[2108]: I0209 19:04:39.087408 2108 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:04:39.087595 kubelet[2108]: I0209 19:04:39.087511 2108 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:04:39.087595 kubelet[2108]: I0209 19:04:39.087530 2108 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:04:39.087595 kubelet[2108]: I0209 19:04:39.087564 2108 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:04:39.087595 kubelet[2108]: I0209 19:04:39.087586 2108 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:04:39.091048 kubelet[2108]: W0209 19:04:39.091000 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.31:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-dbdb6b501f&limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.091248 kubelet[2108]: E0209 19:04:39.091236 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.31:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-dbdb6b501f&limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.091426 kubelet[2108]: I0209 19:04:39.091414 2108 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:04:39.091810 kubelet[2108]: W0209 19:04:39.091792 2108 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:04:39.092566 kubelet[2108]: I0209 19:04:39.092546 2108 server.go:1232] "Started kubelet" Feb 9 19:04:39.092881 kubelet[2108]: W0209 19:04:39.092823 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.31:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.092953 kubelet[2108]: E0209 19:04:39.092893 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.31:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.093195 kubelet[2108]: I0209 19:04:39.093180 2108 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:04:39.093000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:39.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:39.094196 kubelet[2108]: I0209 19:04:39.094055 2108 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:04:39.093000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a65bc0 a1=c000a7f110 a2=c000a65b90 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.093000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:39.094509 kubelet[2108]: I0209 19:04:39.094495 2108 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:04:39.093000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:39.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:39.093000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a974e0 a1=c000a7f128 a2=c000a65c50 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.093000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:39.094929 kubelet[2108]: I0209 19:04:39.094915 2108 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:04:39.095086 kubelet[2108]: I0209 19:04:39.095073 2108 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:04:39.095561 kubelet[2108]: I0209 19:04:39.095540 2108 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:04:39.095773 kubelet[2108]: I0209 19:04:39.095754 2108 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:04:39.097000 audit[2118]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.097000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9bf70d40 a2=0 a3=7ffd9bf70d2c items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:04:39.099000 audit[2119]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.099000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb247b5a0 a2=0 a3=7fffb247b58c items=0 ppid=2108 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:04:39.100882 kubelet[2108]: E0209 19:04:39.100854 2108 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:04:39.100965 kubelet[2108]: E0209 19:04:39.100896 2108 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:04:39.101198 kubelet[2108]: E0209 19:04:39.101089 2108 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-dbdb6b501f.17b2472fbd57d28e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-dbdb6b501f", UID:"ci-3510.3.2-a-dbdb6b501f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-dbdb6b501f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 4, 39, 92523662, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 4, 39, 92523662, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-dbdb6b501f"}': 'Post "https://10.200.8.31:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.31:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:04:39.102345 kubelet[2108]: I0209 19:04:39.102329 2108 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:04:39.102000 audit[2121]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.102000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3531cf80 a2=0 a3=7ffd3531cf6c items=0 ppid=2108 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:04:39.104134 kubelet[2108]: E0209 19:04:39.104068 2108 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.31:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-dbdb6b501f?timeout=10s\": dial tcp 10.200.8.31:6443: connect: connection refused" interval="200ms" Feb 9 19:04:39.105588 kubelet[2108]: I0209 19:04:39.105569 2108 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:04:39.105752 kubelet[2108]: I0209 19:04:39.105741 2108 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:04:39.106000 audit[2123]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.106000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9b47f1f0 a2=0 a3=7ffd9b47f1dc items=0 ppid=2108 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:04:39.117646 kubelet[2108]: W0209 19:04:39.117578 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.31:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.117890 kubelet[2108]: E0209 19:04:39.117872 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.31:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.125000 audit[2127]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.125000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd28b61c80 a2=0 a3=7ffd28b61c6c items=0 ppid=2108 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:04:39.126443 kubelet[2108]: I0209 19:04:39.126371 2108 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:04:39.126000 audit[2128]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:04:39.126000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd78d6420 a2=0 a3=7fffd78d640c items=0 ppid=2108 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:04:39.128524 kubelet[2108]: I0209 19:04:39.128496 2108 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:04:39.128617 kubelet[2108]: I0209 19:04:39.128533 2108 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:04:39.128617 kubelet[2108]: I0209 19:04:39.128559 2108 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:04:39.128692 kubelet[2108]: E0209 19:04:39.128619 2108 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:04:39.128000 audit[2129]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.128000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd0a96ce0 a2=0 a3=7ffcd0a96ccc items=0 ppid=2108 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:04:39.129000 audit[2130]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.129000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff11b11660 a2=0 a3=7fff11b1164c items=0 ppid=2108 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:04:39.130000 audit[2131]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:04:39.130000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda002d3c0 a2=0 a3=7ffda002d3ac items=0 ppid=2108 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:04:39.132000 audit[2133]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:04:39.132000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff40485a70 a2=0 a3=7fff40485a5c items=0 ppid=2108 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:04:39.135000 audit[2134]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:04:39.135000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd78dd6240 a2=0 a3=7ffd78dd622c items=0 ppid=2108 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:04:39.137000 audit[2135]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:04:39.137000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd3c017f0 a2=0 a3=7ffdd3c017dc items=0 ppid=2108 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:04:39.139373 kubelet[2108]: W0209 19:04:39.139322 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.31:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.139469 kubelet[2108]: E0209 19:04:39.139380 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.31:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:39.180728 kubelet[2108]: I0209 19:04:39.180689 2108 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:04:39.180728 kubelet[2108]: I0209 19:04:39.180718 2108 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:04:39.181025 kubelet[2108]: I0209 19:04:39.180761 2108 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:04:39.186550 kubelet[2108]: I0209 19:04:39.186520 2108 policy_none.go:49] "None policy: Start" Feb 9 19:04:39.187253 kubelet[2108]: I0209 19:04:39.187232 2108 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:04:39.187374 kubelet[2108]: I0209 19:04:39.187259 2108 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:04:39.194287 systemd[1]: Created slice kubepods.slice. Feb 9 19:04:39.198992 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:04:39.202063 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:04:39.204659 kubelet[2108]: I0209 19:04:39.204583 2108 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.205028 kubelet[2108]: E0209 19:04:39.205000 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.31:6443/api/v1/nodes\": dial tcp 10.200.8.31:6443: connect: connection refused" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.208470 kubelet[2108]: I0209 19:04:39.208453 2108 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:04:39.207000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:39.207000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:39.209211 kubelet[2108]: I0209 19:04:39.209197 2108 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:04:39.209568 kubelet[2108]: I0209 19:04:39.209549 2108 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:04:39.207000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aebc20 a1=c000721b60 a2=c000aebbf0 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:39.207000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:39.211193 kubelet[2108]: E0209 19:04:39.211177 2108 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-dbdb6b501f\" not found" Feb 9 19:04:39.229239 kubelet[2108]: I0209 19:04:39.229203 2108 topology_manager.go:215] "Topology Admit Handler" podUID="7cfa8cbc5a89c7e91e10ef92d66c05c2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.230865 kubelet[2108]: I0209 19:04:39.230835 2108 topology_manager.go:215] "Topology Admit Handler" podUID="f9619ab6f0bb857f596851eeb7d7a742" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.232303 kubelet[2108]: I0209 19:04:39.232282 2108 topology_manager.go:215] "Topology Admit Handler" podUID="62beb4eca97d866c4e6f8bc755d12883" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.238241 systemd[1]: Created slice kubepods-burstable-pod7cfa8cbc5a89c7e91e10ef92d66c05c2.slice. Feb 9 19:04:39.239360 kubelet[2108]: W0209 19:04:39.239339 2108 helpers.go:242] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7cfa8cbc5a89c7e91e10ef92d66c05c2.slice/cpu.max": read /sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7cfa8cbc5a89c7e91e10ef92d66c05c2.slice/cpu.max: no such device Feb 9 19:04:39.250484 systemd[1]: Created slice kubepods-burstable-podf9619ab6f0bb857f596851eeb7d7a742.slice. Feb 9 19:04:39.255626 systemd[1]: Created slice kubepods-burstable-pod62beb4eca97d866c4e6f8bc755d12883.slice. Feb 9 19:04:39.305124 kubelet[2108]: E0209 19:04:39.305071 2108 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.31:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-dbdb6b501f?timeout=10s\": dial tcp 10.200.8.31:6443: connect: connection refused" interval="400ms" Feb 9 19:04:39.409910 kubelet[2108]: I0209 19:04:39.406730 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.409910 kubelet[2108]: I0209 19:04:39.408029 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.409910 kubelet[2108]: I0209 19:04:39.408112 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.409910 kubelet[2108]: I0209 19:04:39.408156 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.409910 kubelet[2108]: I0209 19:04:39.408208 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62beb4eca97d866c4e6f8bc755d12883-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-dbdb6b501f\" (UID: \"62beb4eca97d866c4e6f8bc755d12883\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: I0209 19:04:39.408267 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: I0209 19:04:39.408303 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: I0209 19:04:39.408356 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: I0209 19:04:39.408395 2108 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: I0209 19:04:39.407493 2108 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.410350 kubelet[2108]: E0209 19:04:39.409098 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.31:6443/api/v1/nodes\": dial tcp 10.200.8.31:6443: connect: connection refused" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.500044 kubelet[2108]: E0209 19:04:39.499928 2108 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-dbdb6b501f.17b2472fbd57d28e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-dbdb6b501f", UID:"ci-3510.3.2-a-dbdb6b501f", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-dbdb6b501f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 4, 39, 92523662, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 4, 39, 92523662, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-dbdb6b501f"}': 'Post "https://10.200.8.31:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.31:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:04:39.550584 env[1319]: time="2024-02-09T19:04:39.550520147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-dbdb6b501f,Uid:7cfa8cbc5a89c7e91e10ef92d66c05c2,Namespace:kube-system,Attempt:0,}" Feb 9 19:04:39.555645 env[1319]: time="2024-02-09T19:04:39.555261028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-dbdb6b501f,Uid:f9619ab6f0bb857f596851eeb7d7a742,Namespace:kube-system,Attempt:0,}" Feb 9 19:04:39.563795 env[1319]: time="2024-02-09T19:04:39.563525768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-dbdb6b501f,Uid:62beb4eca97d866c4e6f8bc755d12883,Namespace:kube-system,Attempt:0,}" Feb 9 19:04:39.706057 kubelet[2108]: E0209 19:04:39.705930 2108 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.31:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-dbdb6b501f?timeout=10s\": dial tcp 10.200.8.31:6443: connect: connection refused" interval="800ms" Feb 9 19:04:39.811148 kubelet[2108]: I0209 19:04:39.811088 2108 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:39.811505 kubelet[2108]: E0209 19:04:39.811479 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.31:6443/api/v1/nodes\": dial tcp 10.200.8.31:6443: connect: connection refused" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:40.010114 kubelet[2108]: W0209 19:04:40.009937 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.31:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-dbdb6b501f&limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.010114 kubelet[2108]: E0209 19:04:40.010022 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.31:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-dbdb6b501f&limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.049648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2537518714.mount: Deactivated successfully. Feb 9 19:04:40.077766 env[1319]: time="2024-02-09T19:04:40.077704978Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.081410 env[1319]: time="2024-02-09T19:04:40.081362038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.090580 env[1319]: time="2024-02-09T19:04:40.090530790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.092701 env[1319]: time="2024-02-09T19:04:40.092664725Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.095746 env[1319]: time="2024-02-09T19:04:40.095710376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.098319 env[1319]: time="2024-02-09T19:04:40.098284519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.106979 env[1319]: time="2024-02-09T19:04:40.106945462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.111072 env[1319]: time="2024-02-09T19:04:40.111037930Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.114011 env[1319]: time="2024-02-09T19:04:40.113976579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.119910 env[1319]: time="2024-02-09T19:04:40.119874677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.125905 env[1319]: time="2024-02-09T19:04:40.125870276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.139374 env[1319]: time="2024-02-09T19:04:40.139333099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:04:40.164544 kubelet[2108]: W0209 19:04:40.164298 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.31:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.164544 kubelet[2108]: E0209 19:04:40.164368 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.31:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.172894 env[1319]: time="2024-02-09T19:04:40.172692752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:04:40.172894 env[1319]: time="2024-02-09T19:04:40.172736953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:04:40.172894 env[1319]: time="2024-02-09T19:04:40.172748053Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:04:40.173208 env[1319]: time="2024-02-09T19:04:40.173157460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9d052d3b2161825f6008556f59a6b01946fa91ea905a31cbd44df9dfc0cf516 pid=2145 runtime=io.containerd.runc.v2 Feb 9 19:04:40.202511 systemd[1]: Started cri-containerd-f9d052d3b2161825f6008556f59a6b01946fa91ea905a31cbd44df9dfc0cf516.scope. Feb 9 19:04:40.216323 env[1319]: time="2024-02-09T19:04:40.216247674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:04:40.216540 env[1319]: time="2024-02-09T19:04:40.216329575Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:04:40.216540 env[1319]: time="2024-02-09T19:04:40.216359176Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:04:40.216540 env[1319]: time="2024-02-09T19:04:40.216516079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78 pid=2171 runtime=io.containerd.runc.v2 Feb 9 19:04:40.222835 env[1319]: time="2024-02-09T19:04:40.222749282Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:04:40.223071 env[1319]: time="2024-02-09T19:04:40.223038787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:04:40.223197 env[1319]: time="2024-02-09T19:04:40.223172289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:04:40.223444 env[1319]: time="2024-02-09T19:04:40.223409793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517 pid=2200 runtime=io.containerd.runc.v2 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit: BPF prog-id=62 op=LOAD Feb 9 19:04:40.225000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.225000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2145 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639643035326433623231363138323566363030383535366635396136 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2145 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639643035326433623231363138323566363030383535366635396136 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit: BPF prog-id=63 op=LOAD Feb 9 19:04:40.226000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034a4f0 items=0 ppid=2145 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639643035326433623231363138323566363030383535366635396136 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit: BPF prog-id=64 op=LOAD Feb 9 19:04:40.226000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034a538 items=0 ppid=2145 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639643035326433623231363138323566363030383535366635396136 Feb 9 19:04:40.226000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:04:40.226000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.226000 audit: BPF prog-id=65 op=LOAD Feb 9 19:04:40.226000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034a948 items=0 ppid=2145 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639643035326433623231363138323566363030383535366635396136 Feb 9 19:04:40.248433 systemd[1]: Started cri-containerd-8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78.scope. Feb 9 19:04:40.262733 systemd[1]: Started cri-containerd-a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517.scope. Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.280000 audit: BPF prog-id=66 op=LOAD Feb 9 19:04:40.282000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.282000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2171 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323337366236323438653562636564626334396166366231613431 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2171 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323337366236323438653562636564626334396166366231613431 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.283000 audit: BPF prog-id=67 op=LOAD Feb 9 19:04:40.283000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000381f90 items=0 ppid=2171 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323337366236323438653562636564626334396166366231613431 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.284000 audit: BPF prog-id=68 op=LOAD Feb 9 19:04:40.284000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381fd8 items=0 ppid=2171 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323337366236323438653562636564626334396166366231613431 Feb 9 19:04:40.285000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:04:40.285000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { perfmon } for pid=2205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit[2205]: AVC avc: denied { bpf } for pid=2205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.286000 audit: BPF prog-id=69 op=LOAD Feb 9 19:04:40.286000 audit[2205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004003e8 items=0 ppid=2171 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323337366236323438653562636564626334396166366231613431 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.299000 audit: BPF prog-id=70 op=LOAD Feb 9 19:04:40.300000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.300000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2200 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376566303031353861643763376530623931613330383734313164 Feb 9 19:04:40.300000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.300000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2200 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376566303031353861643763376530623931613330383734313164 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit: BPF prog-id=71 op=LOAD Feb 9 19:04:40.301000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028ec10 items=0 ppid=2200 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376566303031353861643763376530623931613330383734313164 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit: BPF prog-id=72 op=LOAD Feb 9 19:04:40.301000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028ec58 items=0 ppid=2200 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376566303031353861643763376530623931613330383734313164 Feb 9 19:04:40.301000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:04:40.301000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.301000 audit: BPF prog-id=73 op=LOAD Feb 9 19:04:40.301000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028f068 items=0 ppid=2200 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138376566303031353861643763376530623931613330383734313164 Feb 9 19:04:40.308151 env[1319]: time="2024-02-09T19:04:40.308094697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-dbdb6b501f,Uid:7cfa8cbc5a89c7e91e10ef92d66c05c2,Namespace:kube-system,Attempt:0,} returns sandbox id \"f9d052d3b2161825f6008556f59a6b01946fa91ea905a31cbd44df9dfc0cf516\"" Feb 9 19:04:40.316488 env[1319]: time="2024-02-09T19:04:40.316443435Z" level=info msg="CreateContainer within sandbox \"f9d052d3b2161825f6008556f59a6b01946fa91ea905a31cbd44df9dfc0cf516\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:04:40.349958 env[1319]: time="2024-02-09T19:04:40.349908990Z" level=info msg="CreateContainer within sandbox \"f9d052d3b2161825f6008556f59a6b01946fa91ea905a31cbd44df9dfc0cf516\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"41b4642655d7593ad519a2ac25827cf4c474dc8904265f178f0174778f474043\"" Feb 9 19:04:40.350618 env[1319]: time="2024-02-09T19:04:40.350582401Z" level=info msg="StartContainer for \"41b4642655d7593ad519a2ac25827cf4c474dc8904265f178f0174778f474043\"" Feb 9 19:04:40.351964 env[1319]: time="2024-02-09T19:04:40.351929123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-dbdb6b501f,Uid:62beb4eca97d866c4e6f8bc755d12883,Namespace:kube-system,Attempt:0,} returns sandbox id \"a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517\"" Feb 9 19:04:40.355051 env[1319]: time="2024-02-09T19:04:40.355017475Z" level=info msg="CreateContainer within sandbox \"a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:04:40.358016 env[1319]: time="2024-02-09T19:04:40.357987324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-dbdb6b501f,Uid:f9619ab6f0bb857f596851eeb7d7a742,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78\"" Feb 9 19:04:40.361579 env[1319]: time="2024-02-09T19:04:40.361517882Z" level=info msg="CreateContainer within sandbox \"8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:04:40.373223 systemd[1]: Started cri-containerd-41b4642655d7593ad519a2ac25827cf4c474dc8904265f178f0174778f474043.scope. Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.392000 audit: BPF prog-id=74 op=LOAD Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2145 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623436343236353564373539336164353139613261633235383237 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2145 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623436343236353564373539336164353139613261633235383237 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.393000 audit: BPF prog-id=75 op=LOAD Feb 9 19:04:40.393000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003ce080 items=0 ppid=2145 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623436343236353564373539336164353139613261633235383237 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.394000 audit: BPF prog-id=76 op=LOAD Feb 9 19:04:40.394000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003ce0c8 items=0 ppid=2145 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.396006 env[1319]: time="2024-02-09T19:04:40.395973753Z" level=info msg="CreateContainer within sandbox \"a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85\"" Feb 9 19:04:40.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623436343236353564373539336164353139613261633235383237 Feb 9 19:04:40.395000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:04:40.395000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { perfmon } for pid=2272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit[2272]: AVC avc: denied { bpf } for pid=2272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.395000 audit: BPF prog-id=77 op=LOAD Feb 9 19:04:40.395000 audit[2272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003ce4d8 items=0 ppid=2145 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.397256 env[1319]: time="2024-02-09T19:04:40.396778967Z" level=info msg="StartContainer for \"d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85\"" Feb 9 19:04:40.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623436343236353564373539336164353139613261633235383237 Feb 9 19:04:40.411431 env[1319]: time="2024-02-09T19:04:40.411372609Z" level=info msg="CreateContainer within sandbox \"8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f\"" Feb 9 19:04:40.412106 env[1319]: time="2024-02-09T19:04:40.412071820Z" level=info msg="StartContainer for \"2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f\"" Feb 9 19:04:40.422981 systemd[1]: Started cri-containerd-d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85.scope. Feb 9 19:04:40.455114 env[1319]: time="2024-02-09T19:04:40.455065733Z" level=info msg="StartContainer for \"41b4642655d7593ad519a2ac25827cf4c474dc8904265f178f0174778f474043\" returns successfully" Feb 9 19:04:40.463744 systemd[1]: Started cri-containerd-2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f.scope. Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit: BPF prog-id=78 op=LOAD Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363464373837653238633532356635373130663332313432613262 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363464373837653238633532356635373130663332313432613262 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.482000 audit: BPF prog-id=79 op=LOAD Feb 9 19:04:40.482000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002187a0 items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363464373837653238633532356635373130663332313432613262 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit: BPF prog-id=80 op=LOAD Feb 9 19:04:40.483000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002187e8 items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363464373837653238633532356635373130663332313432613262 Feb 9 19:04:40.483000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:04:40.483000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.483000 audit: BPF prog-id=81 op=LOAD Feb 9 19:04:40.483000 audit[2300]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000218bf8 items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363464373837653238633532356635373130663332313432613262 Feb 9 19:04:40.507664 kubelet[2108]: E0209 19:04:40.507619 2108 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.31:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-dbdb6b501f?timeout=10s\": dial tcp 10.200.8.31:6443: connect: connection refused" interval="1.6s" Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit: BPF prog-id=82 op=LOAD Feb 9 19:04:40.510000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333138643366373935363434663135386439656261363130323034 Feb 9 19:04:40.510000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.510000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333138643366373935363434663135386439656261363130323034 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit: BPF prog-id=83 op=LOAD Feb 9 19:04:40.511000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000342250 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333138643366373935363434663135386439656261363130323034 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit: BPF prog-id=84 op=LOAD Feb 9 19:04:40.511000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000342298 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333138643366373935363434663135386439656261363130323034 Feb 9 19:04:40.511000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:04:40.511000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:40.511000 audit: BPF prog-id=85 op=LOAD Feb 9 19:04:40.511000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003426a8 items=0 ppid=2171 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:40.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333138643366373935363434663135386439656261363130323034 Feb 9 19:04:40.563089 env[1319]: time="2024-02-09T19:04:40.555634500Z" level=info msg="StartContainer for \"2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f\" returns successfully" Feb 9 19:04:40.581743 env[1319]: time="2024-02-09T19:04:40.581670532Z" level=info msg="StartContainer for \"d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85\" returns successfully" Feb 9 19:04:40.590913 kubelet[2108]: W0209 19:04:40.590829 2108 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.31:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.591078 kubelet[2108]: E0209 19:04:40.590938 2108 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.31:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.31:6443: connect: connection refused Feb 9 19:04:40.614282 kubelet[2108]: I0209 19:04:40.613647 2108 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:42.372000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.372000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002d84b0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:42.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:42.373000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.373000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000d65e0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:42.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:42.802000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.802000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00717fb60 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.802000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.802000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005be6540 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.803000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.803000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00717fc80 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.813000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.813000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0064731c0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.813000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.813000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0043db6b0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.815000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:42.815000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003e3b050 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:04:42.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:04:42.986268 kubelet[2108]: E0209 19:04:42.986222 2108 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-dbdb6b501f\" not found" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:43.007004 kubelet[2108]: I0209 19:04:43.006966 2108 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:43.095859 kubelet[2108]: I0209 19:04:43.095808 2108 apiserver.go:52] "Watching apiserver" Feb 9 19:04:43.106140 kubelet[2108]: I0209 19:04:43.106099 2108 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:04:43.591612 kubelet[2108]: E0209 19:04:43.591563 2108 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:44.825024 kubelet[2108]: W0209 19:04:44.824992 2108 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:04:44.976645 kubelet[2108]: W0209 19:04:44.976606 2108 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:04:46.326141 systemd[1]: Reloading. Feb 9 19:04:46.423557 /usr/lib/systemd/system-generators/torcx-generator[2402]: time="2024-02-09T19:04:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:04:46.424129 /usr/lib/systemd/system-generators/torcx-generator[2402]: time="2024-02-09T19:04:46Z" level=info msg="torcx already run" Feb 9 19:04:46.512079 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:04:46.512101 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:04:46.530878 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629628 kernel: kauditd_printk_skb: 583 callbacks suppressed Feb 9 19:04:46.629840 kernel: audit: type=1400 audit(1707505486.609:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.658118 kernel: audit: type=1400 audit(1707505486.609:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.658299 kernel: audit: type=1400 audit(1707505486.609:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672023 kernel: audit: type=1400 audit(1707505486.609:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.701229 kernel: audit: type=1400 audit(1707505486.609:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.701399 kernel: audit: type=1400 audit(1707505486.609:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.715967 kernel: audit: type=1400 audit(1707505486.609:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.730751 kernel: audit: type=1400 audit(1707505486.609:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.730901 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.748876 kernel: audit: type=1400 audit(1707505486.609:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit: BPF prog-id=86 op=LOAD Feb 9 19:04:46.629000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.657000 audit: BPF prog-id=87 op=LOAD Feb 9 19:04:46.657000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit: BPF prog-id=88 op=LOAD Feb 9 19:04:46.672000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit: BPF prog-id=89 op=LOAD Feb 9 19:04:46.686000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit: BPF prog-id=90 op=LOAD Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.700000 audit: BPF prog-id=91 op=LOAD Feb 9 19:04:46.700000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:04:46.700000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:04:46.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit: BPF prog-id=94 op=LOAD Feb 9 19:04:46.751000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:04:46.751000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.751000 audit: BPF prog-id=95 op=LOAD Feb 9 19:04:46.752000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit: BPF prog-id=96 op=LOAD Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.752000 audit: BPF prog-id=97 op=LOAD Feb 9 19:04:46.752000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:04:46.752000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.753000 audit: BPF prog-id=98 op=LOAD Feb 9 19:04:46.753000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.756000 audit: BPF prog-id=99 op=LOAD Feb 9 19:04:46.756000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit: BPF prog-id=100 op=LOAD Feb 9 19:04:46.759000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit: BPF prog-id=101 op=LOAD Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit: BPF prog-id=102 op=LOAD Feb 9 19:04:46.759000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:04:46.759000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.760000 audit: BPF prog-id=103 op=LOAD Feb 9 19:04:46.760000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit: BPF prog-id=104 op=LOAD Feb 9 19:04:46.764000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.765000 audit: BPF prog-id=105 op=LOAD Feb 9 19:04:46.765000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.766000 audit: BPF prog-id=106 op=LOAD Feb 9 19:04:46.766000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:04:46.786220 kubelet[2108]: I0209 19:04:46.785954 2108 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:04:46.786063 systemd[1]: Stopping kubelet.service... Feb 9 19:04:46.805191 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:04:46.805443 systemd[1]: Stopped kubelet.service. Feb 9 19:04:46.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.808281 systemd[1]: Started kubelet.service. Feb 9 19:04:46.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:46.910895 kubelet[2464]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:04:46.910895 kubelet[2464]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:04:46.910895 kubelet[2464]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:04:46.910895 kubelet[2464]: I0209 19:04:46.902231 2464 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:04:46.913303 kubelet[2464]: I0209 19:04:46.913268 2464 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:04:46.913303 kubelet[2464]: I0209 19:04:46.913303 2464 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:04:46.913553 kubelet[2464]: I0209 19:04:46.913533 2464 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:04:46.915944 kubelet[2464]: I0209 19:04:46.915910 2464 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:04:46.918678 kubelet[2464]: I0209 19:04:46.918651 2464 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:04:46.925988 kubelet[2464]: I0209 19:04:46.925963 2464 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:04:46.926274 kubelet[2464]: I0209 19:04:46.926255 2464 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:04:46.926513 kubelet[2464]: I0209 19:04:46.926486 2464 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:04:46.926652 kubelet[2464]: I0209 19:04:46.926530 2464 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:04:46.926652 kubelet[2464]: I0209 19:04:46.926542 2464 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:04:46.926652 kubelet[2464]: I0209 19:04:46.926582 2464 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:04:46.926781 kubelet[2464]: I0209 19:04:46.926691 2464 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:04:46.926781 kubelet[2464]: I0209 19:04:46.926711 2464 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:04:46.935777 kubelet[2464]: I0209 19:04:46.935750 2464 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:04:46.935894 kubelet[2464]: I0209 19:04:46.935789 2464 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:04:46.945277 kubelet[2464]: I0209 19:04:46.945252 2464 apiserver.go:52] "Watching apiserver" Feb 9 19:04:46.949391 kubelet[2464]: I0209 19:04:46.949365 2464 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:04:46.952218 kubelet[2464]: I0209 19:04:46.952195 2464 server.go:1232] "Started kubelet" Feb 9 19:04:46.956000 audit[2464]: AVC avc: denied { mac_admin } for pid=2464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.956000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:46.956000 audit[2464]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d38930 a1=c000407e48 a2=c000d38900 a3=25 items=0 ppid=1 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:46.956000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:46.957584 kubelet[2464]: I0209 19:04:46.957270 2464 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:04:46.957584 kubelet[2464]: I0209 19:04:46.957312 2464 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:04:46.957584 kubelet[2464]: I0209 19:04:46.957347 2464 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:04:46.956000 audit[2464]: AVC avc: denied { mac_admin } for pid=2464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:46.956000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:46.956000 audit[2464]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b8d500 a1=c000407e60 a2=c000d389c0 a3=25 items=0 ppid=1 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:46.956000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:46.960400 kubelet[2464]: E0209 19:04:46.960383 2464 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:04:46.960491 kubelet[2464]: E0209 19:04:46.960411 2464 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:04:46.969794 kubelet[2464]: I0209 19:04:46.965654 2464 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:04:46.969794 kubelet[2464]: I0209 19:04:46.968292 2464 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:04:46.969794 kubelet[2464]: I0209 19:04:46.968659 2464 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:04:46.974083 kubelet[2464]: I0209 19:04:46.974055 2464 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:04:46.976048 kubelet[2464]: I0209 19:04:46.976024 2464 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:04:46.989218 kubelet[2464]: I0209 19:04:46.989022 2464 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:04:46.989745 kubelet[2464]: I0209 19:04:46.989509 2464 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:04:47.005882 kubelet[2464]: I0209 19:04:47.004799 2464 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:04:47.006040 kubelet[2464]: I0209 19:04:47.005995 2464 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:04:47.006040 kubelet[2464]: I0209 19:04:47.006024 2464 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:04:47.006173 kubelet[2464]: I0209 19:04:47.006045 2464 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:04:47.006173 kubelet[2464]: E0209 19:04:47.006099 2464 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:04:47.075578 kubelet[2464]: I0209 19:04:47.075544 2464 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.109733 kubelet[2464]: E0209 19:04:47.109688 2464 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:04:47.123151 kubelet[2464]: I0209 19:04:47.123110 2464 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:04:47.123151 kubelet[2464]: I0209 19:04:47.123146 2464 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:04:47.123374 kubelet[2464]: I0209 19:04:47.123172 2464 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:04:47.123443 kubelet[2464]: I0209 19:04:47.123382 2464 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:04:47.123443 kubelet[2464]: I0209 19:04:47.123412 2464 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 19:04:47.123443 kubelet[2464]: I0209 19:04:47.123422 2464 policy_none.go:49] "None policy: Start" Feb 9 19:04:47.124550 kubelet[2464]: I0209 19:04:47.124522 2464 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:04:47.124691 kubelet[2464]: I0209 19:04:47.124570 2464 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:04:47.124806 kubelet[2464]: I0209 19:04:47.124790 2464 state_mem.go:75] "Updated machine memory state" Feb 9 19:04:47.132903 kubelet[2464]: I0209 19:04:47.132878 2464 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:04:47.133042 kubelet[2464]: I0209 19:04:47.132950 2464 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:04:47.132000 audit[2464]: AVC avc: denied { mac_admin } for pid=2464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:04:47.132000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:04:47.132000 audit[2464]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009dd7d0 a1=c0010b9248 a2=c0009dd7a0 a3=25 items=0 ppid=1 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:04:47.132000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:04:47.133416 kubelet[2464]: I0209 19:04:47.133202 2464 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:04:47.145006 kubelet[2464]: I0209 19:04:47.144975 2464 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.145151 kubelet[2464]: I0209 19:04:47.145073 2464 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.310446 kubelet[2464]: I0209 19:04:47.310330 2464 topology_manager.go:215] "Topology Admit Handler" podUID="7cfa8cbc5a89c7e91e10ef92d66c05c2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.314714 kubelet[2464]: I0209 19:04:47.314689 2464 topology_manager.go:215] "Topology Admit Handler" podUID="f9619ab6f0bb857f596851eeb7d7a742" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.315013 kubelet[2464]: I0209 19:04:47.314997 2464 topology_manager.go:215] "Topology Admit Handler" podUID="62beb4eca97d866c4e6f8bc755d12883" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.322162 kubelet[2464]: W0209 19:04:47.322127 2464 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 19:04:47.348406 kubelet[2464]: I0209 19:04:47.348368 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" podStartSLOduration=3.34830145 podCreationTimestamp="2024-02-09 19:04:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:04:47.345953217 +0000 UTC m=+0.530118070" watchObservedRunningTime="2024-02-09 19:04:47.34830145 +0000 UTC m=+0.532466303" Feb 9 19:04:47.358648 kubelet[2464]: I0209 19:04:47.358607 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" podStartSLOduration=0.358551293 podCreationTimestamp="2024-02-09 19:04:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:04:47.356482764 +0000 UTC m=+0.540647617" watchObservedRunningTime="2024-02-09 19:04:47.358551293 +0000 UTC m=+0.542716246" Feb 9 19:04:47.369280 kubelet[2464]: I0209 19:04:47.369246 2464 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:04:47.370733 kubelet[2464]: I0209 19:04:47.370706 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.370953 kubelet[2464]: I0209 19:04:47.370936 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371088 kubelet[2464]: I0209 19:04:47.371077 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371196 kubelet[2464]: I0209 19:04:47.371186 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371307 kubelet[2464]: I0209 19:04:47.371297 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371413 kubelet[2464]: I0209 19:04:47.371404 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62beb4eca97d866c4e6f8bc755d12883-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-dbdb6b501f\" (UID: \"62beb4eca97d866c4e6f8bc755d12883\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371521 kubelet[2464]: I0209 19:04:47.371512 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371624 kubelet[2464]: I0209 19:04:47.371615 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f9619ab6f0bb857f596851eeb7d7a742-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-dbdb6b501f\" (UID: \"f9619ab6f0bb857f596851eeb7d7a742\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:47.371725 kubelet[2464]: I0209 19:04:47.371716 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7cfa8cbc5a89c7e91e10ef92d66c05c2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-dbdb6b501f\" (UID: \"7cfa8cbc5a89c7e91e10ef92d66c05c2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" Feb 9 19:04:48.073225 kubelet[2464]: I0209 19:04:48.073163 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-dbdb6b501f" podStartSLOduration=4.073076353 podCreationTimestamp="2024-02-09 19:04:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:04:47.372113183 +0000 UTC m=+0.556278136" watchObservedRunningTime="2024-02-09 19:04:48.073076353 +0000 UTC m=+1.257241306" Feb 9 19:04:52.985832 sudo[1701]: pam_unix(sudo:session): session closed for user root Feb 9 19:04:52.985000 audit[1701]: USER_END pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:52.990047 kernel: kauditd_printk_skb: 298 callbacks suppressed Feb 9 19:04:52.990123 kernel: audit: type=1106 audit(1707505492.985:915): pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:52.989000 audit[1701]: CRED_DISP pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:53.029953 kernel: audit: type=1104 audit(1707505492.989:916): pid=1701 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:04:53.096627 sshd[1698]: pam_unix(sshd:session): session closed for user core Feb 9 19:04:53.097000 audit[1698]: USER_END pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:53.101261 systemd[1]: sshd@6-10.200.8.31:22-10.200.12.6:51530.service: Deactivated successfully. Feb 9 19:04:53.102135 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:04:53.102311 systemd[1]: session-9.scope: Consumed 4.239s CPU time. Feb 9 19:04:53.103916 systemd-logind[1303]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:04:53.104962 systemd-logind[1303]: Removed session 9. Feb 9 19:04:53.097000 audit[1698]: CRED_DISP pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:53.133766 kernel: audit: type=1106 audit(1707505493.097:917): pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:53.133922 kernel: audit: type=1104 audit(1707505493.097:918): pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:04:53.133953 kernel: audit: type=1131 audit(1707505493.098:919): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.31:22-10.200.12.6:51530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:53.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.31:22-10.200.12.6:51530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:04:57.321000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:04:57.321000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8ad40 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.374873 kernel: audit: type=1400 audit(1707505497.321:920): avc: denied { watch } for pid=2344 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:04:57.375021 kernel: audit: type=1300 audit(1707505497.321:920): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8ad40 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.375056 kernel: audit: type=1327 audit(1707505497.321:920): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:57.321000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:57.414000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.418000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.449990 kernel: audit: type=1400 audit(1707505497.414:921): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.450107 kernel: audit: type=1400 audit(1707505497.418:922): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.418000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e73da0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:57.419000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.419000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e73ec0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:57.420000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:04:57.420000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e73fe0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:04:57.414000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eec040 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:04:57.414000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:00.601545 kubelet[2464]: I0209 19:05:00.601509 2464 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:05:00.602387 env[1319]: time="2024-02-09T19:05:00.602276987Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:05:00.602781 kubelet[2464]: I0209 19:05:00.602564 2464 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:05:01.263065 kubelet[2464]: I0209 19:05:01.263022 2464 topology_manager.go:215] "Topology Admit Handler" podUID="a58a4e48-7cee-4546-8247-06c60f461041" podNamespace="kube-system" podName="kube-proxy-t2rj4" Feb 9 19:05:01.269643 systemd[1]: Created slice kubepods-besteffort-poda58a4e48_7cee_4546_8247_06c60f461041.slice. Feb 9 19:05:01.385033 kubelet[2464]: I0209 19:05:01.384976 2464 topology_manager.go:215] "Topology Admit Handler" podUID="c2f20ed9-0f84-443a-81d1-8db60936f4e3" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-jm9mp" Feb 9 19:05:01.391584 systemd[1]: Created slice kubepods-besteffort-podc2f20ed9_0f84_443a_81d1_8db60936f4e3.slice. Feb 9 19:05:01.457408 kubelet[2464]: I0209 19:05:01.457345 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a58a4e48-7cee-4546-8247-06c60f461041-xtables-lock\") pod \"kube-proxy-t2rj4\" (UID: \"a58a4e48-7cee-4546-8247-06c60f461041\") " pod="kube-system/kube-proxy-t2rj4" Feb 9 19:05:01.457408 kubelet[2464]: I0209 19:05:01.457413 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ztpnp\" (UniqueName: \"kubernetes.io/projected/a58a4e48-7cee-4546-8247-06c60f461041-kube-api-access-ztpnp\") pod \"kube-proxy-t2rj4\" (UID: \"a58a4e48-7cee-4546-8247-06c60f461041\") " pod="kube-system/kube-proxy-t2rj4" Feb 9 19:05:01.457710 kubelet[2464]: I0209 19:05:01.457453 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a58a4e48-7cee-4546-8247-06c60f461041-kube-proxy\") pod \"kube-proxy-t2rj4\" (UID: \"a58a4e48-7cee-4546-8247-06c60f461041\") " pod="kube-system/kube-proxy-t2rj4" Feb 9 19:05:01.457710 kubelet[2464]: I0209 19:05:01.457485 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a58a4e48-7cee-4546-8247-06c60f461041-lib-modules\") pod \"kube-proxy-t2rj4\" (UID: \"a58a4e48-7cee-4546-8247-06c60f461041\") " pod="kube-system/kube-proxy-t2rj4" Feb 9 19:05:01.559373 kubelet[2464]: I0209 19:05:01.557684 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c2f20ed9-0f84-443a-81d1-8db60936f4e3-var-lib-calico\") pod \"tigera-operator-55585899bf-jm9mp\" (UID: \"c2f20ed9-0f84-443a-81d1-8db60936f4e3\") " pod="tigera-operator/tigera-operator-55585899bf-jm9mp" Feb 9 19:05:01.559373 kubelet[2464]: I0209 19:05:01.558396 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bgn46\" (UniqueName: \"kubernetes.io/projected/c2f20ed9-0f84-443a-81d1-8db60936f4e3-kube-api-access-bgn46\") pod \"tigera-operator-55585899bf-jm9mp\" (UID: \"c2f20ed9-0f84-443a-81d1-8db60936f4e3\") " pod="tigera-operator/tigera-operator-55585899bf-jm9mp" Feb 9 19:05:01.579233 env[1319]: time="2024-02-09T19:05:01.579189352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t2rj4,Uid:a58a4e48-7cee-4546-8247-06c60f461041,Namespace:kube-system,Attempt:0,}" Feb 9 19:05:01.607369 env[1319]: time="2024-02-09T19:05:01.607122137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:01.607369 env[1319]: time="2024-02-09T19:05:01.607170738Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:01.607369 env[1319]: time="2024-02-09T19:05:01.607188338Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:01.608107 env[1319]: time="2024-02-09T19:05:01.608048347Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401 pid=2551 runtime=io.containerd.runc.v2 Feb 9 19:05:01.632836 systemd[1]: Started cri-containerd-84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401.scope. Feb 9 19:05:01.668267 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 19:05:01.668445 kernel: audit: type=1400 audit(1707505501.647:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.686881 kernel: audit: type=1400 audit(1707505501.647:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.705874 kernel: audit: type=1400 audit(1707505501.647:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.706015 env[1319]: time="2024-02-09T19:05:01.705897846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-jm9mp,Uid:c2f20ed9-0f84-443a-81d1-8db60936f4e3,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.717087 env[1319]: time="2024-02-09T19:05:01.707990767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t2rj4,Uid:a58a4e48-7cee-4546-8247-06c60f461041,Namespace:kube-system,Attempt:0,} returns sandbox id \"84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401\"" Feb 9 19:05:01.717087 env[1319]: time="2024-02-09T19:05:01.713039219Z" level=info msg="CreateContainer within sandbox \"84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:05:01.720946 kernel: audit: type=1400 audit(1707505501.647:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.721053 kernel: audit: type=1400 audit(1707505501.647:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.735869 kernel: audit: type=1400 audit(1707505501.647:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.764651 kernel: audit: type=1400 audit(1707505501.647:931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.779449 env[1319]: time="2024-02-09T19:05:01.779345496Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:01.779922 kernel: audit: type=1400 audit(1707505501.647:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.780010 kernel: audit: type=1400 audit(1707505501.647:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.780958 env[1319]: time="2024-02-09T19:05:01.780923912Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:01.781089 env[1319]: time="2024-02-09T19:05:01.781071514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:01.781288 env[1319]: time="2024-02-09T19:05:01.781263616Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc pid=2593 runtime=io.containerd.runc.v2 Feb 9 19:05:01.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.667000 audit: BPF prog-id=107 op=LOAD Feb 9 19:05:01.813336 kernel: audit: type=1400 audit(1707505501.667:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2551 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834636537363662303039623461613135383134366135373433646133 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2551 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834636537363662303039623461613135383134366135373433646133 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit: BPF prog-id=108 op=LOAD Feb 9 19:05:01.668000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b26f0 items=0 ppid=2551 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834636537363662303039623461613135383134366135373433646133 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit: BPF prog-id=109 op=LOAD Feb 9 19:05:01.668000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b2738 items=0 ppid=2551 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834636537363662303039623461613135383134366135373433646133 Feb 9 19:05:01.668000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:05:01.668000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.668000 audit: BPF prog-id=110 op=LOAD Feb 9 19:05:01.668000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b2b48 items=0 ppid=2551 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834636537363662303039623461613135383134366135373433646133 Feb 9 19:05:01.815943 env[1319]: time="2024-02-09T19:05:01.815887670Z" level=info msg="CreateContainer within sandbox \"84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"099261002d24834d5414ad5273dffbf974c45db6007273cf67b5ccb969f3e798\"" Feb 9 19:05:01.819183 env[1319]: time="2024-02-09T19:05:01.819035202Z" level=info msg="StartContainer for \"099261002d24834d5414ad5273dffbf974c45db6007273cf67b5ccb969f3e798\"" Feb 9 19:05:01.825899 systemd[1]: Started cri-containerd-54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc.scope. Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.851000 audit: BPF prog-id=111 op=LOAD Feb 9 19:05:01.852000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.852000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2593 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613536356563383262313234663765643733303162656638663730 Feb 9 19:05:01.854000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.854000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2593 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613536356563383262313234663765643733303162656638663730 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.855000 audit: BPF prog-id=112 op=LOAD Feb 9 19:05:01.855000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d3780 items=0 ppid=2593 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613536356563383262313234663765643733303162656638663730 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.857000 audit: BPF prog-id=113 op=LOAD Feb 9 19:05:01.857000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d37c8 items=0 ppid=2593 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613536356563383262313234663765643733303162656638663730 Feb 9 19:05:01.858000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:05:01.858000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.858000 audit: BPF prog-id=114 op=LOAD Feb 9 19:05:01.858000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d3bd8 items=0 ppid=2593 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534613536356563383262313234663765643733303162656638663730 Feb 9 19:05:01.862472 systemd[1]: Started cri-containerd-099261002d24834d5414ad5273dffbf974c45db6007273cf67b5ccb969f3e798.scope. Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2551 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393236313030326432343833346435343134616435323733646666 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit: BPF prog-id=115 op=LOAD Feb 9 19:05:01.884000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a4d50 items=0 ppid=2551 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393236313030326432343833346435343134616435323733646666 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit: BPF prog-id=116 op=LOAD Feb 9 19:05:01.884000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a4d98 items=0 ppid=2551 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393236313030326432343833346435343134616435323733646666 Feb 9 19:05:01.884000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:05:01.884000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:01.884000 audit: BPF prog-id=117 op=LOAD Feb 9 19:05:01.884000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a4e28 items=0 ppid=2551 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039393236313030326432343833346435343134616435323733646666 Feb 9 19:05:01.909622 env[1319]: time="2024-02-09T19:05:01.909507526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-jm9mp,Uid:c2f20ed9-0f84-443a-81d1-8db60936f4e3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc\"" Feb 9 19:05:01.918362 env[1319]: time="2024-02-09T19:05:01.913773469Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:05:01.922106 env[1319]: time="2024-02-09T19:05:01.922025054Z" level=info msg="StartContainer for \"099261002d24834d5414ad5273dffbf974c45db6007273cf67b5ccb969f3e798\" returns successfully" Feb 9 19:05:01.984000 audit[2686]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:01.984000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb30491b0 a2=0 a3=7ffeb304919c items=0 ppid=2638 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:05:01.986000 audit[2687]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:01.986000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe48652850 a2=0 a3=7ffe4865283c items=0 ppid=2638 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:05:01.987000 audit[2688]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:01.987000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6a0bcff0 a2=0 a3=7ffc6a0bcfdc items=0 ppid=2638 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:05:01.988000 audit[2689]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:01.988000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcffa1360 a2=0 a3=7fffcffa134c items=0 ppid=2638 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:05:01.990000 audit[2690]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:01.990000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb0aa7740 a2=0 a3=7ffcb0aa772c items=0 ppid=2638 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:05:01.991000 audit[2691]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:01.991000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4598afa0 a2=0 a3=7ffc4598af8c items=0 ppid=2638 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:01.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:05:02.083474 kubelet[2464]: I0209 19:05:02.083429 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-t2rj4" podStartSLOduration=1.083393985 podCreationTimestamp="2024-02-09 19:05:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:05:02.083192283 +0000 UTC m=+15.267357136" watchObservedRunningTime="2024-02-09 19:05:02.083393985 +0000 UTC m=+15.267558938" Feb 9 19:05:02.088000 audit[2692]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.088000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc61a183d0 a2=0 a3=7ffc61a183bc items=0 ppid=2638 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:05:02.091000 audit[2694]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.091000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd9a8d2ed0 a2=0 a3=7ffd9a8d2ebc items=0 ppid=2638 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:05:02.095000 audit[2697]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.095000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe9f3e92c0 a2=0 a3=7ffe9f3e92ac items=0 ppid=2638 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:05:02.097000 audit[2698]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.097000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff05370230 a2=0 a3=7fff0537021c items=0 ppid=2638 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:05:02.100000 audit[2700]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.100000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd202b0070 a2=0 a3=7ffd202b005c items=0 ppid=2638 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:05:02.101000 audit[2701]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.101000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffd81a240 a2=0 a3=7ffffd81a22c items=0 ppid=2638 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:05:02.104000 audit[2703]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.104000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6da33bc0 a2=0 a3=7ffe6da33bac items=0 ppid=2638 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:05:02.108000 audit[2706]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.108000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec4860a00 a2=0 a3=7ffec48609ec items=0 ppid=2638 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:05:02.109000 audit[2707]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.109000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5fad3c90 a2=0 a3=7ffe5fad3c7c items=0 ppid=2638 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:05:02.111000 audit[2709]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.111000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa2f14bc0 a2=0 a3=7fffa2f14bac items=0 ppid=2638 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:05:02.113000 audit[2710]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.113000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a38b1a0 a2=0 a3=7ffc0a38b18c items=0 ppid=2638 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:05:02.115000 audit[2712]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.115000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed53dd5b0 a2=0 a3=7ffed53dd59c items=0 ppid=2638 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:05:02.119000 audit[2715]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.119000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec0225330 a2=0 a3=7ffec022531c items=0 ppid=2638 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:05:02.122000 audit[2718]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.122000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc02ae8e50 a2=0 a3=7ffc02ae8e3c items=0 ppid=2638 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:05:02.124000 audit[2719]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.124000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf10fc330 a2=0 a3=7ffcf10fc31c items=0 ppid=2638 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:05:02.126000 audit[2721]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.126000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc0154db00 a2=0 a3=7ffc0154daec items=0 ppid=2638 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:05:02.130000 audit[2724]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.130000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea65cb190 a2=0 a3=7ffea65cb17c items=0 ppid=2638 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:05:02.131000 audit[2725]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.131000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef8267fa0 a2=0 a3=7ffef8267f8c items=0 ppid=2638 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:05:02.134000 audit[2727]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:05:02.134000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc72abeac0 a2=0 a3=7ffc72abeaac items=0 ppid=2638 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:05:02.159000 audit[2733]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:02.159000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffec4b30ec0 a2=0 a3=7ffec4b30eac items=0 ppid=2638 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:02.172000 audit[2733]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:02.172000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffec4b30ec0 a2=0 a3=7ffec4b30eac items=0 ppid=2638 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:02.174000 audit[2738]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.174000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff81bdc9b0 a2=0 a3=7fff81bdc99c items=0 ppid=2638 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:05:02.177000 audit[2740]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.177000 audit[2740]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc63b2fcb0 a2=0 a3=7ffc63b2fc9c items=0 ppid=2638 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:05:02.181000 audit[2743]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.181000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5b48f680 a2=0 a3=7ffc5b48f66c items=0 ppid=2638 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:05:02.182000 audit[2744]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.182000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff41390780 a2=0 a3=7fff4139076c items=0 ppid=2638 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:05:02.184000 audit[2746]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.184000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd960af810 a2=0 a3=7ffd960af7fc items=0 ppid=2638 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:05:02.186000 audit[2747]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.186000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1e1b9090 a2=0 a3=7ffd1e1b907c items=0 ppid=2638 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:05:02.188000 audit[2749]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.188000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe70f60b40 a2=0 a3=7ffe70f60b2c items=0 ppid=2638 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:05:02.192000 audit[2752]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.192000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd1820df20 a2=0 a3=7ffd1820df0c items=0 ppid=2638 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:05:02.193000 audit[2753]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.193000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5920f510 a2=0 a3=7ffe5920f4fc items=0 ppid=2638 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:05:02.195000 audit[2755]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.195000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd7a896b0 a2=0 a3=7fffd7a8969c items=0 ppid=2638 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:05:02.197000 audit[2756]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.197000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcec6faec0 a2=0 a3=7ffcec6faeac items=0 ppid=2638 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:05:02.200000 audit[2758]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.200000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7d7fa8d0 a2=0 a3=7fff7d7fa8bc items=0 ppid=2638 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:05:02.203000 audit[2761]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.203000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc7776310 a2=0 a3=7ffcc77762fc items=0 ppid=2638 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:05:02.207000 audit[2764]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.207000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf71a0860 a2=0 a3=7ffdf71a084c items=0 ppid=2638 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:05:02.208000 audit[2765]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.208000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf84c9250 a2=0 a3=7ffcf84c923c items=0 ppid=2638 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:05:02.211000 audit[2767]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.211000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe9a6b8350 a2=0 a3=7ffe9a6b833c items=0 ppid=2638 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:05:02.214000 audit[2770]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.214000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff89c256c0 a2=0 a3=7fff89c256ac items=0 ppid=2638 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:05:02.215000 audit[2771]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.215000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbb7af7e0 a2=0 a3=7fffbb7af7cc items=0 ppid=2638 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:05:02.218000 audit[2773]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.218000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe837488a0 a2=0 a3=7ffe8374888c items=0 ppid=2638 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:05:02.219000 audit[2774]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.219000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb0486ed0 a2=0 a3=7ffcb0486ebc items=0 ppid=2638 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:05:02.221000 audit[2776]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.221000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff47ac74c0 a2=0 a3=7fff47ac74ac items=0 ppid=2638 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:05:02.225000 audit[2779]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:05:02.225000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf8deba80 a2=0 a3=7ffcf8deba6c items=0 ppid=2638 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:05:02.228000 audit[2781]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:05:02.228000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc60821030 a2=0 a3=7ffc6082101c items=0 ppid=2638 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.228000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:02.228000 audit[2781]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:05:02.228000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc60821030 a2=0 a3=7ffc6082101c items=0 ppid=2638 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:02.228000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:02.574799 systemd[1]: run-containerd-runc-k8s.io-84ce766b009b4aa158146a5743da307a8f60c5041e8f08a94ca30d2ee1fd6401-runc.pjv6NP.mount: Deactivated successfully. Feb 9 19:05:03.547341 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4282595990.mount: Deactivated successfully. Feb 9 19:05:04.598732 env[1319]: time="2024-02-09T19:05:04.598676107Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:04.604026 env[1319]: time="2024-02-09T19:05:04.603982358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:04.607676 env[1319]: time="2024-02-09T19:05:04.607622393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:04.611521 env[1319]: time="2024-02-09T19:05:04.611479130Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:04.612086 env[1319]: time="2024-02-09T19:05:04.612052836Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:05:04.616126 env[1319]: time="2024-02-09T19:05:04.616089775Z" level=info msg="CreateContainer within sandbox \"54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:05:04.636584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1429136110.mount: Deactivated successfully. Feb 9 19:05:04.652008 env[1319]: time="2024-02-09T19:05:04.651948519Z" level=info msg="CreateContainer within sandbox \"54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809\"" Feb 9 19:05:04.652634 env[1319]: time="2024-02-09T19:05:04.652598825Z" level=info msg="StartContainer for \"291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809\"" Feb 9 19:05:04.675949 systemd[1]: Started cri-containerd-291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809.scope. Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit: BPF prog-id=118 op=LOAD Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2593 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316633663435323436376331646666633233646664626638363735 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2593 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316633663435323436376331646666633233646664626638363735 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit: BPF prog-id=119 op=LOAD Feb 9 19:05:04.693000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000261080 items=0 ppid=2593 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316633663435323436376331646666633233646664626638363735 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.693000 audit: BPF prog-id=120 op=LOAD Feb 9 19:05:04.693000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002610c8 items=0 ppid=2593 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316633663435323436376331646666633233646664626638363735 Feb 9 19:05:04.694000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:05:04.694000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:04.694000 audit: BPF prog-id=121 op=LOAD Feb 9 19:05:04.694000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002614d8 items=0 ppid=2593 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:04.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316633663435323436376331646666633233646664626638363735 Feb 9 19:05:04.713016 env[1319]: time="2024-02-09T19:05:04.712940605Z" level=info msg="StartContainer for \"291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809\" returns successfully" Feb 9 19:05:06.603000 audit[2819]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:06.603000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffdcdcc6d90 a2=0 a3=7ffdcdcc6d7c items=0 ppid=2638 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:06.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:06.604000 audit[2819]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:06.604000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffdcdcc6d90 a2=0 a3=31030 items=0 ppid=2638 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:06.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:06.614000 audit[2821]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:06.614000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd1602ab80 a2=0 a3=7ffd1602ab6c items=0 ppid=2638 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:06.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:06.615000 audit[2821]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:06.615000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd1602ab80 a2=0 a3=31030 items=0 ppid=2638 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:06.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:06.744763 kubelet[2464]: I0209 19:05:06.744715 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-jm9mp" podStartSLOduration=3.04319635 podCreationTimestamp="2024-02-09 19:05:01 +0000 UTC" firstStartedPulling="2024-02-09 19:05:01.911017341 +0000 UTC m=+15.095182294" lastFinishedPulling="2024-02-09 19:05:04.61246834 +0000 UTC m=+17.796633193" observedRunningTime="2024-02-09 19:05:05.089163201 +0000 UTC m=+18.273328454" watchObservedRunningTime="2024-02-09 19:05:06.744647249 +0000 UTC m=+19.928812102" Feb 9 19:05:06.745781 kubelet[2464]: I0209 19:05:06.745746 2464 topology_manager.go:215] "Topology Admit Handler" podUID="fe483b07-909e-4d6e-80fc-bbacb7f97d19" podNamespace="calico-system" podName="calico-typha-5b7dd47876-kx8ck" Feb 9 19:05:06.757390 systemd[1]: Created slice kubepods-besteffort-podfe483b07_909e_4d6e_80fc_bbacb7f97d19.slice. Feb 9 19:05:06.863733 kubelet[2464]: I0209 19:05:06.863617 2464 topology_manager.go:215] "Topology Admit Handler" podUID="5c701950-c8d9-4638-a52c-5e6a00736313" podNamespace="calico-system" podName="calico-node-269w7" Feb 9 19:05:06.871595 systemd[1]: Created slice kubepods-besteffort-pod5c701950_c8d9_4638_a52c_5e6a00736313.slice. Feb 9 19:05:06.906165 kubelet[2464]: I0209 19:05:06.906121 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe483b07-909e-4d6e-80fc-bbacb7f97d19-tigera-ca-bundle\") pod \"calico-typha-5b7dd47876-kx8ck\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " pod="calico-system/calico-typha-5b7dd47876-kx8ck" Feb 9 19:05:06.906739 kubelet[2464]: I0209 19:05:06.906711 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe483b07-909e-4d6e-80fc-bbacb7f97d19-typha-certs\") pod \"calico-typha-5b7dd47876-kx8ck\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " pod="calico-system/calico-typha-5b7dd47876-kx8ck" Feb 9 19:05:06.906903 kubelet[2464]: I0209 19:05:06.906884 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7nds\" (UniqueName: \"kubernetes.io/projected/fe483b07-909e-4d6e-80fc-bbacb7f97d19-kube-api-access-j7nds\") pod \"calico-typha-5b7dd47876-kx8ck\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " pod="calico-system/calico-typha-5b7dd47876-kx8ck" Feb 9 19:05:06.976077 kubelet[2464]: I0209 19:05:06.976034 2464 topology_manager.go:215] "Topology Admit Handler" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" podNamespace="calico-system" podName="csi-node-driver-djrwv" Feb 9 19:05:06.976753 kubelet[2464]: E0209 19:05:06.976721 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:07.007168 kubelet[2464]: I0209 19:05:07.007129 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-policysync\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009125 kubelet[2464]: I0209 19:05:07.008995 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-net-dir\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009397 kubelet[2464]: I0209 19:05:07.009378 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hhm9\" (UniqueName: \"kubernetes.io/projected/5c701950-c8d9-4638-a52c-5e6a00736313-kube-api-access-5hhm9\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009536 kubelet[2464]: I0209 19:05:07.009525 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-run-calico\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009638 kubelet[2464]: I0209 19:05:07.009628 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-lib-calico\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009732 kubelet[2464]: I0209 19:05:07.009722 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-log-dir\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.009840 kubelet[2464]: I0209 19:05:07.009828 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-flexvol-driver-host\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.010001 kubelet[2464]: I0209 19:05:07.009988 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-xtables-lock\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.010114 kubelet[2464]: I0209 19:05:07.010103 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c701950-c8d9-4638-a52c-5e6a00736313-tigera-ca-bundle\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.010229 kubelet[2464]: I0209 19:05:07.010218 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-lib-modules\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.010329 kubelet[2464]: I0209 19:05:07.010317 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c701950-c8d9-4638-a52c-5e6a00736313-node-certs\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.010468 kubelet[2464]: I0209 19:05:07.010455 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-bin-dir\") pod \"calico-node-269w7\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " pod="calico-system/calico-node-269w7" Feb 9 19:05:07.062448 env[1319]: time="2024-02-09T19:05:07.062388870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b7dd47876-kx8ck,Uid:fe483b07-909e-4d6e-80fc-bbacb7f97d19,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:07.104145 env[1319]: time="2024-02-09T19:05:07.104072147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:07.104343 env[1319]: time="2024-02-09T19:05:07.104150948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:07.104343 env[1319]: time="2024-02-09T19:05:07.104177948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:07.104494 env[1319]: time="2024-02-09T19:05:07.104456151Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a pid=2830 runtime=io.containerd.runc.v2 Feb 9 19:05:07.111063 kubelet[2464]: I0209 19:05:07.111029 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e66e7c92-500b-4b98-8b54-ad6bf0e951c2-socket-dir\") pod \"csi-node-driver-djrwv\" (UID: \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\") " pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:07.111357 kubelet[2464]: I0209 19:05:07.111338 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7zs5\" (UniqueName: \"kubernetes.io/projected/e66e7c92-500b-4b98-8b54-ad6bf0e951c2-kube-api-access-j7zs5\") pod \"csi-node-driver-djrwv\" (UID: \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\") " pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:07.111490 kubelet[2464]: I0209 19:05:07.111477 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e66e7c92-500b-4b98-8b54-ad6bf0e951c2-registration-dir\") pod \"csi-node-driver-djrwv\" (UID: \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\") " pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:07.111693 kubelet[2464]: I0209 19:05:07.111683 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e66e7c92-500b-4b98-8b54-ad6bf0e951c2-varrun\") pod \"csi-node-driver-djrwv\" (UID: \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\") " pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:07.111829 kubelet[2464]: I0209 19:05:07.111815 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e66e7c92-500b-4b98-8b54-ad6bf0e951c2-kubelet-dir\") pod \"csi-node-driver-djrwv\" (UID: \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\") " pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:07.113706 kubelet[2464]: E0209 19:05:07.113674 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.122026 kubelet[2464]: W0209 19:05:07.113829 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.122189 kubelet[2464]: E0209 19:05:07.122174 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.124955 kubelet[2464]: E0209 19:05:07.124936 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.125093 kubelet[2464]: W0209 19:05:07.125070 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.125332 kubelet[2464]: E0209 19:05:07.125316 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.125587 kubelet[2464]: E0209 19:05:07.125575 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.125681 kubelet[2464]: W0209 19:05:07.125668 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.125866 kubelet[2464]: E0209 19:05:07.125839 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.126099 kubelet[2464]: E0209 19:05:07.126088 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.126191 kubelet[2464]: W0209 19:05:07.126177 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.126359 kubelet[2464]: E0209 19:05:07.126347 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.126585 kubelet[2464]: E0209 19:05:07.126573 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.126670 kubelet[2464]: W0209 19:05:07.126657 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.131457 kubelet[2464]: E0209 19:05:07.131439 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.137772 systemd[1]: Started cri-containerd-6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a.scope. Feb 9 19:05:07.139298 kubelet[2464]: E0209 19:05:07.139275 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.139298 kubelet[2464]: W0209 19:05:07.139297 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.139649 kubelet[2464]: E0209 19:05:07.139561 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.139649 kubelet[2464]: W0209 19:05:07.139574 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.140984 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142237 kubelet[2464]: W0209 19:05:07.140999 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.141169 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142237 kubelet[2464]: W0209 19:05:07.141176 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.141309 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142237 kubelet[2464]: W0209 19:05:07.141316 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.141445 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142237 kubelet[2464]: W0209 19:05:07.141451 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.141583 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142237 kubelet[2464]: W0209 19:05:07.141590 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142237 kubelet[2464]: E0209 19:05:07.141715 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142678 kubelet[2464]: W0209 19:05:07.141722 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142678 kubelet[2464]: E0209 19:05:07.141737 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.142678 kubelet[2464]: E0209 19:05:07.141890 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142678 kubelet[2464]: W0209 19:05:07.141899 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142678 kubelet[2464]: E0209 19:05:07.141913 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.142678 kubelet[2464]: E0209 19:05:07.142115 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.142678 kubelet[2464]: W0209 19:05:07.142122 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.142678 kubelet[2464]: E0209 19:05:07.142134 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.146406 kubelet[2464]: E0209 19:05:07.146391 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.147314 kubelet[2464]: W0209 19:05:07.147297 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.147425 kubelet[2464]: E0209 19:05:07.147415 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.147518 kubelet[2464]: E0209 19:05:07.147510 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.148002 kubelet[2464]: E0209 19:05:07.147988 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.148099 kubelet[2464]: W0209 19:05:07.148089 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.148170 kubelet[2464]: E0209 19:05:07.148163 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.148244 kubelet[2464]: E0209 19:05:07.148236 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.148495 kubelet[2464]: E0209 19:05:07.148483 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.148579 kubelet[2464]: W0209 19:05:07.148570 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.148649 kubelet[2464]: E0209 19:05:07.148642 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.148896 kubelet[2464]: E0209 19:05:07.148884 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.148973 kubelet[2464]: W0209 19:05:07.148964 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.149041 kubelet[2464]: E0209 19:05:07.149035 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.149302 kubelet[2464]: E0209 19:05:07.149290 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.149384 kubelet[2464]: W0209 19:05:07.149375 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.149449 kubelet[2464]: E0209 19:05:07.149442 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.150408 kubelet[2464]: E0209 19:05:07.150395 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.150506 kubelet[2464]: W0209 19:05:07.150496 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.150580 kubelet[2464]: E0209 19:05:07.150572 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.150660 kubelet[2464]: E0209 19:05:07.150653 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.150892 kubelet[2464]: E0209 19:05:07.150881 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.150977 kubelet[2464]: W0209 19:05:07.150967 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.151054 kubelet[2464]: E0209 19:05:07.151045 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.151315 kubelet[2464]: E0209 19:05:07.151303 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.151398 kubelet[2464]: W0209 19:05:07.151389 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.151466 kubelet[2464]: E0209 19:05:07.151459 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.151760 kubelet[2464]: E0209 19:05:07.151750 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.151854 kubelet[2464]: W0209 19:05:07.151831 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.151936 kubelet[2464]: E0209 19:05:07.151928 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.152014 kubelet[2464]: E0209 19:05:07.152006 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.152290 kubelet[2464]: E0209 19:05:07.152279 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.152370 kubelet[2464]: W0209 19:05:07.152361 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.152439 kubelet[2464]: E0209 19:05:07.152432 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.152687 kubelet[2464]: E0209 19:05:07.152677 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.152768 kubelet[2464]: W0209 19:05:07.152759 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.152834 kubelet[2464]: E0209 19:05:07.152827 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.153480 kubelet[2464]: E0209 19:05:07.153466 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.153576 kubelet[2464]: W0209 19:05:07.153564 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.153646 kubelet[2464]: E0209 19:05:07.153636 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.153723 kubelet[2464]: E0209 19:05:07.153714 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.153810 kubelet[2464]: E0209 19:05:07.153801 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.154571 kubelet[2464]: E0209 19:05:07.153982 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.158079 kubelet[2464]: E0209 19:05:07.158067 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.158181 kubelet[2464]: W0209 19:05:07.158171 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.158258 kubelet[2464]: E0209 19:05:07.158250 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.158937 kubelet[2464]: E0209 19:05:07.158924 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.159052 kubelet[2464]: W0209 19:05:07.159040 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.159131 kubelet[2464]: E0209 19:05:07.159123 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.159412 kubelet[2464]: E0209 19:05:07.159401 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.159508 kubelet[2464]: W0209 19:05:07.159498 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.159584 kubelet[2464]: E0209 19:05:07.159577 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.159885 kubelet[2464]: E0209 19:05:07.159873 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.159989 kubelet[2464]: W0209 19:05:07.159978 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.160076 kubelet[2464]: E0209 19:05:07.160069 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.175621 kernel: kauditd_printk_skb: 369 callbacks suppressed Feb 9 19:05:07.175711 kernel: audit: type=1400 audit(1707505507.168:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.181699 env[1319]: time="2024-02-09T19:05:07.181323246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-269w7,Uid:5c701950-c8d9-4638-a52c-5e6a00736313,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.221055 kernel: audit: type=1400 audit(1707505507.168:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.221177 kernel: audit: type=1400 audit(1707505507.168:1042): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.221202 kernel: audit: type=1400 audit(1707505507.168:1043): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.221296 kubelet[2464]: E0209 19:05:07.220862 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.221296 kubelet[2464]: W0209 19:05:07.220883 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.221296 kubelet[2464]: E0209 19:05:07.220907 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.250835 kernel: audit: type=1400 audit(1707505507.168:1044): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238146 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251078 kubelet[2464]: W0209 19:05:07.238169 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238201 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238481 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251078 kubelet[2464]: W0209 19:05:07.238490 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238568 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238702 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251078 kubelet[2464]: W0209 19:05:07.238709 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238778 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251078 kubelet[2464]: E0209 19:05:07.238888 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251516 kubelet[2464]: W0209 19:05:07.238895 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.238908 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.239072 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251516 kubelet[2464]: W0209 19:05:07.239078 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.239092 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.239244 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251516 kubelet[2464]: W0209 19:05:07.239250 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.239266 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251516 kubelet[2464]: E0209 19:05:07.239476 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251516 kubelet[2464]: W0209 19:05:07.239485 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.239499 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.239668 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251949 kubelet[2464]: W0209 19:05:07.239676 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.239689 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.239878 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251949 kubelet[2464]: W0209 19:05:07.239885 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.239952 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.240087 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.251949 kubelet[2464]: W0209 19:05:07.240094 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.251949 kubelet[2464]: E0209 19:05:07.240170 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240272 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252341 kubelet[2464]: W0209 19:05:07.240278 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240344 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240441 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252341 kubelet[2464]: W0209 19:05:07.240449 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240462 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240603 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252341 kubelet[2464]: W0209 19:05:07.240609 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240617 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252341 kubelet[2464]: E0209 19:05:07.240757 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252750 kubelet[2464]: W0209 19:05:07.240764 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.240774 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.240953 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252750 kubelet[2464]: W0209 19:05:07.240962 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.240974 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.241391 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252750 kubelet[2464]: W0209 19:05:07.241401 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.241420 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.252750 kubelet[2464]: E0209 19:05:07.241576 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.252750 kubelet[2464]: W0209 19:05:07.241582 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.241650 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.241737 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257327 kubelet[2464]: W0209 19:05:07.241742 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.241802 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.241901 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257327 kubelet[2464]: W0209 19:05:07.241908 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.241965 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.242059 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257327 kubelet[2464]: W0209 19:05:07.242065 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257327 kubelet[2464]: E0209 19:05:07.242076 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242257 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257759 kubelet[2464]: W0209 19:05:07.242265 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242279 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242419 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257759 kubelet[2464]: W0209 19:05:07.242426 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242437 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242707 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.257759 kubelet[2464]: W0209 19:05:07.242714 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242728 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.257759 kubelet[2464]: E0209 19:05:07.242890 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.258168 kubelet[2464]: W0209 19:05:07.242897 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.258168 kubelet[2464]: E0209 19:05:07.242907 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.277233 env[1319]: time="2024-02-09T19:05:07.270654155Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:07.277233 env[1319]: time="2024-02-09T19:05:07.270723655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:07.277233 env[1319]: time="2024-02-09T19:05:07.270746856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:07.277233 env[1319]: time="2024-02-09T19:05:07.270874857Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1 pid=2921 runtime=io.containerd.runc.v2 Feb 9 19:05:07.279866 kernel: audit: type=1400 audit(1707505507.168:1045): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.301879 kernel: audit: type=1400 audit(1707505507.168:1046): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.302156 kubelet[2464]: E0209 19:05:07.297189 2464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:05:07.302156 kubelet[2464]: W0209 19:05:07.297208 2464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:05:07.302156 kubelet[2464]: E0209 19:05:07.297235 2464 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:05:07.313034 systemd[1]: Started cri-containerd-961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1.scope. Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.330936 kernel: audit: type=1400 audit(1707505507.168:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.346877 kernel: audit: type=1400 audit(1707505507.168:1048): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.365893 kernel: audit: type=1400 audit(1707505507.168:1049): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.168000 audit: BPF prog-id=122 op=LOAD Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2830 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393161306438363331306635613563653261656339336631323634 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2830 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393161306438363331306635613563653261656339336631323634 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.191000 audit: BPF prog-id=123 op=LOAD Feb 9 19:05:07.191000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037f3e0 items=0 ppid=2830 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393161306438363331306635613563653261656339336631323634 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.243000 audit: BPF prog-id=124 op=LOAD Feb 9 19:05:07.243000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037f428 items=0 ppid=2830 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393161306438363331306635613563653261656339336631323634 Feb 9 19:05:07.251000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:05:07.251000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.251000 audit: BPF prog-id=125 op=LOAD Feb 9 19:05:07.251000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037f838 items=0 ppid=2830 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393161306438363331306635613563653261656339336631323634 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit: BPF prog-id=126 op=LOAD Feb 9 19:05:07.348000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.348000 audit[2933]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2921 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313735333534303030316337396666613433333130326335383337 Feb 9 19:05:07.365000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.365000 audit[2933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2921 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313735333534303030316337396666613433333130326335383337 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit: BPF prog-id=127 op=LOAD Feb 9 19:05:07.366000 audit[2933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030ef20 items=0 ppid=2921 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313735333534303030316337396666613433333130326335383337 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit: BPF prog-id=128 op=LOAD Feb 9 19:05:07.366000 audit[2933]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030ef68 items=0 ppid=2921 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313735333534303030316337396666613433333130326335383337 Feb 9 19:05:07.366000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:05:07.366000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { perfmon } for pid=2933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit[2933]: AVC avc: denied { bpf } for pid=2933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:07.366000 audit: BPF prog-id=129 op=LOAD Feb 9 19:05:07.366000 audit[2933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030f378 items=0 ppid=2921 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936313735333534303030316337396666613433333130326335383337 Feb 9 19:05:07.397803 env[1319]: time="2024-02-09T19:05:07.390383438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-269w7,Uid:5c701950-c8d9-4638-a52c-5e6a00736313,Namespace:calico-system,Attempt:0,} returns sandbox id \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\"" Feb 9 19:05:07.404496 env[1319]: time="2024-02-09T19:05:07.404046962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:05:07.440652 env[1319]: time="2024-02-09T19:05:07.440604593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b7dd47876-kx8ck,Uid:fe483b07-909e-4d6e-80fc-bbacb7f97d19,Namespace:calico-system,Attempt:0,} returns sandbox id \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\"" Feb 9 19:05:07.628000 audit[2966]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:07.628000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffca8b2b670 a2=0 a3=7ffca8b2b65c items=0 ppid=2638 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:07.630000 audit[2966]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:07.630000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffca8b2b670 a2=0 a3=31030 items=0 ppid=2638 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:07.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:08.639000 audit[2968]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:08.639000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffff986d950 a2=0 a3=7ffff986d93c items=0 ppid=2638 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:08.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:08.640000 audit[2968]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:08.640000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffff986d950 a2=0 a3=31030 items=0 ppid=2638 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:08.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:09.006991 kubelet[2464]: E0209 19:05:09.006830 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:11.008506 kubelet[2464]: E0209 19:05:11.008097 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:11.817358 env[1319]: time="2024-02-09T19:05:11.817303544Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:11.822258 env[1319]: time="2024-02-09T19:05:11.822214385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:11.826681 env[1319]: time="2024-02-09T19:05:11.826645722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:11.830934 env[1319]: time="2024-02-09T19:05:11.830902258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:11.831774 env[1319]: time="2024-02-09T19:05:11.831735865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:05:11.834624 env[1319]: time="2024-02-09T19:05:11.834097385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:05:11.835901 env[1319]: time="2024-02-09T19:05:11.835857700Z" level=info msg="CreateContainer within sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:05:11.861411 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2065530902.mount: Deactivated successfully. Feb 9 19:05:11.881009 env[1319]: time="2024-02-09T19:05:11.880947178Z" level=info msg="CreateContainer within sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\"" Feb 9 19:05:11.883286 env[1319]: time="2024-02-09T19:05:11.881716784Z" level=info msg="StartContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\"" Feb 9 19:05:11.909982 systemd[1]: Started cri-containerd-5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175.scope. Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2921 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:11.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563316664323261613066663238343838346565643563616464393438 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit: BPF prog-id=130 op=LOAD Feb 9 19:05:11.931000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000288850 items=0 ppid=2921 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:11.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563316664323261613066663238343838346565643563616464393438 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit: BPF prog-id=131 op=LOAD Feb 9 19:05:11.931000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000288898 items=0 ppid=2921 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:11.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563316664323261613066663238343838346565643563616464393438 Feb 9 19:05:11.931000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:05:11.931000 audit: BPF prog-id=130 op=UNLOAD Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:11.931000 audit: BPF prog-id=132 op=LOAD Feb 9 19:05:11.931000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000288928 items=0 ppid=2921 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:11.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563316664323261613066663238343838346565643563616464393438 Feb 9 19:05:11.958055 env[1319]: time="2024-02-09T19:05:11.957937524Z" level=info msg="StartContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" returns successfully" Feb 9 19:05:11.965872 systemd[1]: cri-containerd-5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175.scope: Deactivated successfully. Feb 9 19:05:11.970000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:05:11.991531 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175-rootfs.mount: Deactivated successfully. Feb 9 19:05:12.116257 env[1319]: time="2024-02-09T19:05:12.098114185Z" level=info msg="StopContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" with timeout 5 (s)" Feb 9 19:05:12.725737 env[1319]: time="2024-02-09T19:05:12.725678953Z" level=info msg="Stop container \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" with signal terminated" Feb 9 19:05:12.726586 env[1319]: time="2024-02-09T19:05:12.726546960Z" level=info msg="shim disconnected" id=5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175 Feb 9 19:05:12.726786 env[1319]: time="2024-02-09T19:05:12.726755362Z" level=warning msg="cleaning up after shim disconnected" id=5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175 namespace=k8s.io Feb 9 19:05:12.726884 env[1319]: time="2024-02-09T19:05:12.726870663Z" level=info msg="cleaning up dead shim" Feb 9 19:05:12.738524 env[1319]: time="2024-02-09T19:05:12.738485159Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3014 runtime=io.containerd.runc.v2\n" Feb 9 19:05:12.742751 env[1319]: time="2024-02-09T19:05:12.742713293Z" level=info msg="StopContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" returns successfully" Feb 9 19:05:12.743584 env[1319]: time="2024-02-09T19:05:12.743553400Z" level=info msg="StopPodSandbox for \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\"" Feb 9 19:05:12.743693 env[1319]: time="2024-02-09T19:05:12.743633001Z" level=info msg="Container to stop \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:05:12.749000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:05:12.750407 systemd[1]: cri-containerd-961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1.scope: Deactivated successfully. Feb 9 19:05:12.762180 kernel: kauditd_printk_skb: 160 callbacks suppressed Feb 9 19:05:12.762269 kernel: audit: type=1334 audit(1707505512.749:1087): prog-id=126 op=UNLOAD Feb 9 19:05:12.762000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:05:12.770963 kernel: audit: type=1334 audit(1707505512.762:1088): prog-id=129 op=UNLOAD Feb 9 19:05:12.796574 env[1319]: time="2024-02-09T19:05:12.796517037Z" level=info msg="shim disconnected" id=961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1 Feb 9 19:05:12.796892 env[1319]: time="2024-02-09T19:05:12.796866639Z" level=warning msg="cleaning up after shim disconnected" id=961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1 namespace=k8s.io Feb 9 19:05:12.797003 env[1319]: time="2024-02-09T19:05:12.796987940Z" level=info msg="cleaning up dead shim" Feb 9 19:05:12.806464 env[1319]: time="2024-02-09T19:05:12.806425918Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3047 runtime=io.containerd.runc.v2\n" Feb 9 19:05:12.806781 env[1319]: time="2024-02-09T19:05:12.806749421Z" level=info msg="TearDown network for sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" successfully" Feb 9 19:05:12.806892 env[1319]: time="2024-02-09T19:05:12.806779021Z" level=info msg="StopPodSandbox for \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" returns successfully" Feb 9 19:05:12.856693 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1-rootfs.mount: Deactivated successfully. Feb 9 19:05:12.856817 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1-shm.mount: Deactivated successfully. Feb 9 19:05:12.882101 kubelet[2464]: I0209 19:05:12.882059 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-run-calico\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882101 kubelet[2464]: I0209 19:05:12.882105 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-xtables-lock\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882130 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-lib-calico\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882150 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-lib-modules\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882174 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-log-dir\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882199 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-flexvol-driver-host\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882227 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-policysync\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.882684 kubelet[2464]: I0209 19:05:12.882265 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5hhm9\" (UniqueName: \"kubernetes.io/projected/5c701950-c8d9-4638-a52c-5e6a00736313-kube-api-access-5hhm9\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.883032 kubelet[2464]: I0209 19:05:12.882298 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-net-dir\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.883032 kubelet[2464]: I0209 19:05:12.882328 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c701950-c8d9-4638-a52c-5e6a00736313-node-certs\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.883032 kubelet[2464]: I0209 19:05:12.882355 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-bin-dir\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.883032 kubelet[2464]: I0209 19:05:12.882389 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c701950-c8d9-4638-a52c-5e6a00736313-tigera-ca-bundle\") pod \"5c701950-c8d9-4638-a52c-5e6a00736313\" (UID: \"5c701950-c8d9-4638-a52c-5e6a00736313\") " Feb 9 19:05:12.883032 kubelet[2464]: I0209 19:05:12.882938 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/5c701950-c8d9-4638-a52c-5e6a00736313-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:05:12.883254 kubelet[2464]: I0209 19:05:12.883009 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883254 kubelet[2464]: I0209 19:05:12.883037 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883254 kubelet[2464]: I0209 19:05:12.883058 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883254 kubelet[2464]: I0209 19:05:12.883080 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883254 kubelet[2464]: I0209 19:05:12.883102 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883502 kubelet[2464]: I0209 19:05:12.883122 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.883502 kubelet[2464]: I0209 19:05:12.883147 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-policysync" (OuterVolumeSpecName: "policysync") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.885740 kubelet[2464]: I0209 19:05:12.885705 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.888776 systemd[1]: var-lib-kubelet-pods-5c701950\x2dc8d9\x2d4638\x2da52c\x2d5e6a00736313-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5hhm9.mount: Deactivated successfully. Feb 9 19:05:12.890456 kubelet[2464]: I0209 19:05:12.889880 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/5c701950-c8d9-4638-a52c-5e6a00736313-kube-api-access-5hhm9" (OuterVolumeSpecName: "kube-api-access-5hhm9") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "kube-api-access-5hhm9". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:05:12.890681 kubelet[2464]: I0209 19:05:12.889918 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:05:12.894452 systemd[1]: var-lib-kubelet-pods-5c701950\x2dc8d9\x2d4638\x2da52c\x2d5e6a00736313-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 9 19:05:12.895777 kubelet[2464]: I0209 19:05:12.895745 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/5c701950-c8d9-4638-a52c-5e6a00736313-node-certs" (OuterVolumeSpecName: "node-certs") pod "5c701950-c8d9-4638-a52c-5e6a00736313" (UID: "5c701950-c8d9-4638-a52c-5e6a00736313"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983277 2464 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-bin-dir\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983329 2464 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c701950-c8d9-4638-a52c-5e6a00736313-tigera-ca-bundle\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983346 2464 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-run-calico\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983364 2464 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-xtables-lock\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983384 2464 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-var-lib-calico\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.983436 kubelet[2464]: I0209 19:05:12.983399 2464 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-lib-modules\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985221 kubelet[2464]: I0209 19:05:12.983415 2464 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-log-dir\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985340 kubelet[2464]: I0209 19:05:12.985247 2464 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-flexvol-driver-host\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985340 kubelet[2464]: I0209 19:05:12.985269 2464 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-policysync\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985340 kubelet[2464]: I0209 19:05:12.985294 2464 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-5hhm9\" (UniqueName: \"kubernetes.io/projected/5c701950-c8d9-4638-a52c-5e6a00736313-kube-api-access-5hhm9\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985340 kubelet[2464]: I0209 19:05:12.985312 2464 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c701950-c8d9-4638-a52c-5e6a00736313-cni-net-dir\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:12.985340 kubelet[2464]: I0209 19:05:12.985327 2464 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c701950-c8d9-4638-a52c-5e6a00736313-node-certs\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:13.006790 kubelet[2464]: E0209 19:05:13.006756 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:13.013501 systemd[1]: Removed slice kubepods-besteffort-pod5c701950_c8d9_4638_a52c_5e6a00736313.slice. Feb 9 19:05:13.101579 kubelet[2464]: I0209 19:05:13.101545 2464 scope.go:117] "RemoveContainer" containerID="5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175" Feb 9 19:05:13.108046 env[1319]: time="2024-02-09T19:05:13.107533182Z" level=info msg="RemoveContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\"" Feb 9 19:05:13.116268 env[1319]: time="2024-02-09T19:05:13.116190852Z" level=info msg="RemoveContainer for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" returns successfully" Feb 9 19:05:13.116785 kubelet[2464]: I0209 19:05:13.116746 2464 scope.go:117] "RemoveContainer" containerID="5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175" Feb 9 19:05:13.117253 env[1319]: time="2024-02-09T19:05:13.117177460Z" level=error msg="ContainerStatus for \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\": not found" Feb 9 19:05:13.117417 kubelet[2464]: E0209 19:05:13.117397 2464 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\": not found" containerID="5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175" Feb 9 19:05:13.117512 kubelet[2464]: I0209 19:05:13.117462 2464 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175"} err="failed to get container status \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\": rpc error: code = NotFound desc = an error occurred when try to find container \"5c1fd22aa0ff284884eed5cadd948ee95c1d234c439a665b5f8a3d859d3b8175\": not found" Feb 9 19:05:13.137407 kubelet[2464]: I0209 19:05:13.137361 2464 topology_manager.go:215] "Topology Admit Handler" podUID="04b3f97f-4572-4659-93de-9a2bc90c45c9" podNamespace="calico-system" podName="calico-node-fjfqp" Feb 9 19:05:13.137610 kubelet[2464]: E0209 19:05:13.137450 2464 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5c701950-c8d9-4638-a52c-5e6a00736313" containerName="flexvol-driver" Feb 9 19:05:13.137610 kubelet[2464]: I0209 19:05:13.137497 2464 memory_manager.go:346] "RemoveStaleState removing state" podUID="5c701950-c8d9-4638-a52c-5e6a00736313" containerName="flexvol-driver" Feb 9 19:05:13.144390 systemd[1]: Created slice kubepods-besteffort-pod04b3f97f_4572_4659_93de_9a2bc90c45c9.slice. Feb 9 19:05:13.186619 kubelet[2464]: I0209 19:05:13.186578 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-var-run-calico\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.186874 kubelet[2464]: I0209 19:05:13.186711 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54vcn\" (UniqueName: \"kubernetes.io/projected/04b3f97f-4572-4659-93de-9a2bc90c45c9-kube-api-access-54vcn\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.186874 kubelet[2464]: I0209 19:05:13.186804 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-lib-modules\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.186874 kubelet[2464]: I0209 19:05:13.186874 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-xtables-lock\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187064 kubelet[2464]: I0209 19:05:13.186952 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04b3f97f-4572-4659-93de-9a2bc90c45c9-tigera-ca-bundle\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187064 kubelet[2464]: I0209 19:05:13.187018 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04b3f97f-4572-4659-93de-9a2bc90c45c9-node-certs\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187064 kubelet[2464]: I0209 19:05:13.187049 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-cni-bin-dir\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187202 kubelet[2464]: I0209 19:05:13.187117 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-flexvol-driver-host\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187202 kubelet[2464]: I0209 19:05:13.187195 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-policysync\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187297 kubelet[2464]: I0209 19:05:13.187260 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-var-lib-calico\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187348 kubelet[2464]: I0209 19:05:13.187291 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-cni-net-dir\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.187393 kubelet[2464]: I0209 19:05:13.187367 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04b3f97f-4572-4659-93de-9a2bc90c45c9-cni-log-dir\") pod \"calico-node-fjfqp\" (UID: \"04b3f97f-4572-4659-93de-9a2bc90c45c9\") " pod="calico-system/calico-node-fjfqp" Feb 9 19:05:13.448705 env[1319]: time="2024-02-09T19:05:13.448297138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fjfqp,Uid:04b3f97f-4572-4659-93de-9a2bc90c45c9,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:13.475290 env[1319]: time="2024-02-09T19:05:13.475215456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:13.475290 env[1319]: time="2024-02-09T19:05:13.475265956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:13.475560 env[1319]: time="2024-02-09T19:05:13.475516858Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:13.475816 env[1319]: time="2024-02-09T19:05:13.475772460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018 pid=3076 runtime=io.containerd.runc.v2 Feb 9 19:05:13.492893 systemd[1]: Started cri-containerd-2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018.scope. Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.521973 kernel: audit: type=1400 audit(1707505513.505:1089): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.522024 kernel: audit: type=1400 audit(1707505513.505:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.551863 kernel: audit: type=1400 audit(1707505513.505:1091): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.551988 kernel: audit: type=1400 audit(1707505513.505:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.577671 kernel: audit: type=1400 audit(1707505513.505:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.577979 kernel: audit: type=1400 audit(1707505513.505:1094): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.597390 env[1319]: time="2024-02-09T19:05:13.597350344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fjfqp,Uid:04b3f97f-4572-4659-93de-9a2bc90c45c9,Namespace:calico-system,Attempt:0,} returns sandbox id \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\"" Feb 9 19:05:13.603089 env[1319]: time="2024-02-09T19:05:13.603055090Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.621088 kernel: audit: type=1400 audit(1707505513.505:1095): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.621216 kernel: audit: type=1400 audit(1707505513.505:1096): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.534000 audit: BPF prog-id=133 op=LOAD Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3076 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363766656266373735663130623032643066326464303663663761 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3076 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363766656266373735663130623032643066326464303663663761 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit: BPF prog-id=134 op=LOAD Feb 9 19:05:13.535000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000218a30 items=0 ppid=3076 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363766656266373735663130623032643066326464303663663761 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit: BPF prog-id=135 op=LOAD Feb 9 19:05:13.535000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000218a78 items=0 ppid=3076 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363766656266373735663130623032643066326464303663663761 Feb 9 19:05:13.535000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:05:13.535000 audit: BPF prog-id=134 op=UNLOAD Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.535000 audit: BPF prog-id=136 op=LOAD Feb 9 19:05:13.535000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000218e88 items=0 ppid=3076 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262363766656266373735663130623032643066326464303663663761 Feb 9 19:05:13.653091 env[1319]: time="2024-02-09T19:05:13.653023794Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95\"" Feb 9 19:05:13.655536 env[1319]: time="2024-02-09T19:05:13.653874201Z" level=info msg="StartContainer for \"6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95\"" Feb 9 19:05:13.674150 systemd[1]: Started cri-containerd-6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95.scope. Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3076 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393733633431393239386438323233626531356162396662666232 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit: BPF prog-id=137 op=LOAD Feb 9 19:05:13.691000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cbbe0 items=0 ppid=3076 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393733633431393239386438323233626531356162396662666232 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit: BPF prog-id=138 op=LOAD Feb 9 19:05:13.691000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cbc28 items=0 ppid=3076 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393733633431393239386438323233626531356162396662666232 Feb 9 19:05:13.691000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:05:13.691000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:13.691000 audit: BPF prog-id=139 op=LOAD Feb 9 19:05:13.691000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cbcb8 items=0 ppid=3076 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:13.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393733633431393239386438323233626531356162396662666232 Feb 9 19:05:13.715980 env[1319]: time="2024-02-09T19:05:13.711956971Z" level=info msg="StartContainer for \"6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95\" returns successfully" Feb 9 19:05:13.726691 systemd[1]: cri-containerd-6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95.scope: Deactivated successfully. Feb 9 19:05:13.729000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:05:13.830266 env[1319]: time="2024-02-09T19:05:13.830207827Z" level=info msg="shim disconnected" id=6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95 Feb 9 19:05:13.830603 env[1319]: time="2024-02-09T19:05:13.830571930Z" level=warning msg="cleaning up after shim disconnected" id=6a973c419298d8223be15ab9fbfb2efb9d9550d4c37868aaf9e1949658b9ed95 namespace=k8s.io Feb 9 19:05:13.830603 env[1319]: time="2024-02-09T19:05:13.830594930Z" level=info msg="cleaning up dead shim" Feb 9 19:05:13.841205 env[1319]: time="2024-02-09T19:05:13.841167416Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3156 runtime=io.containerd.runc.v2\n" Feb 9 19:05:14.355730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3867308002.mount: Deactivated successfully. Feb 9 19:05:15.007700 kubelet[2464]: E0209 19:05:15.007656 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:15.011717 kubelet[2464]: I0209 19:05:15.011498 2464 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="5c701950-c8d9-4638-a52c-5e6a00736313" path="/var/lib/kubelet/pods/5c701950-c8d9-4638-a52c-5e6a00736313/volumes" Feb 9 19:05:16.892736 env[1319]: time="2024-02-09T19:05:16.892674199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:16.899577 env[1319]: time="2024-02-09T19:05:16.899504651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:16.904608 env[1319]: time="2024-02-09T19:05:16.904549190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:16.910710 env[1319]: time="2024-02-09T19:05:16.910673437Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:16.911433 env[1319]: time="2024-02-09T19:05:16.911397642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:05:16.920426 env[1319]: time="2024-02-09T19:05:16.917143286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:05:16.929518 env[1319]: time="2024-02-09T19:05:16.929480181Z" level=info msg="CreateContainer within sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:05:16.963934 env[1319]: time="2024-02-09T19:05:16.963880745Z" level=info msg="CreateContainer within sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\"" Feb 9 19:05:16.966233 env[1319]: time="2024-02-09T19:05:16.964670551Z" level=info msg="StartContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\"" Feb 9 19:05:16.989971 systemd[1]: Started cri-containerd-e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841.scope. Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.005000 audit: BPF prog-id=140 op=LOAD Feb 9 19:05:17.008661 kubelet[2464]: E0209 19:05:17.008115 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:17.008000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.008000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2830 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532376164636633613731616661306639336336666462643733353565 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2830 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532376164636633613731616661306639336336666462643733353565 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.009000 audit: BPF prog-id=141 op=LOAD Feb 9 19:05:17.009000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000392d00 items=0 ppid=2830 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532376164636633613731616661306639336336666462643733353565 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.010000 audit: BPF prog-id=142 op=LOAD Feb 9 19:05:17.010000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000392d48 items=0 ppid=2830 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532376164636633613731616661306639336336666462643733353565 Feb 9 19:05:17.011000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:05:17.011000 audit: BPF prog-id=141 op=UNLOAD Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:17.011000 audit: BPF prog-id=143 op=LOAD Feb 9 19:05:17.011000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000393158 items=0 ppid=2830 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532376164636633613731616661306639336336666462643733353565 Feb 9 19:05:17.045866 env[1319]: time="2024-02-09T19:05:17.045785467Z" level=info msg="StartContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" returns successfully" Feb 9 19:05:17.114958 env[1319]: time="2024-02-09T19:05:17.114914389Z" level=info msg="StopContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" with timeout 300 (s)" Feb 9 19:05:17.115561 env[1319]: time="2024-02-09T19:05:17.115527593Z" level=info msg="Stop container \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" with signal terminated" Feb 9 19:05:17.151000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:05:17.154000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:05:17.152310 systemd[1]: cri-containerd-e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841.scope: Deactivated successfully. Feb 9 19:05:17.728463 env[1319]: time="2024-02-09T19:05:17.728387015Z" level=info msg="shim disconnected" id=e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841 Feb 9 19:05:17.728463 env[1319]: time="2024-02-09T19:05:17.728452115Z" level=warning msg="cleaning up after shim disconnected" id=e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841 namespace=k8s.io Feb 9 19:05:17.728463 env[1319]: time="2024-02-09T19:05:17.728464415Z" level=info msg="cleaning up dead shim" Feb 9 19:05:17.737422 env[1319]: time="2024-02-09T19:05:17.737371883Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3235 runtime=io.containerd.runc.v2\n" Feb 9 19:05:17.741024 env[1319]: time="2024-02-09T19:05:17.740980910Z" level=info msg="StopContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" returns successfully" Feb 9 19:05:17.741700 env[1319]: time="2024-02-09T19:05:17.741666715Z" level=info msg="StopPodSandbox for \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\"" Feb 9 19:05:17.741821 env[1319]: time="2024-02-09T19:05:17.741740316Z" level=info msg="Container to stop \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:05:17.749519 systemd[1]: cri-containerd-6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a.scope: Deactivated successfully. Feb 9 19:05:17.748000 audit: BPF prog-id=122 op=UNLOAD Feb 9 19:05:17.752000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:05:17.757688 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 9 19:05:17.757792 kernel: audit: type=1334 audit(1707505517.752:1135): prog-id=125 op=UNLOAD Feb 9 19:05:17.792021 env[1319]: time="2024-02-09T19:05:17.791963694Z" level=info msg="shim disconnected" id=6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a Feb 9 19:05:17.792021 env[1319]: time="2024-02-09T19:05:17.792011695Z" level=warning msg="cleaning up after shim disconnected" id=6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a namespace=k8s.io Feb 9 19:05:17.792021 env[1319]: time="2024-02-09T19:05:17.792024795Z" level=info msg="cleaning up dead shim" Feb 9 19:05:17.800537 env[1319]: time="2024-02-09T19:05:17.800488559Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3266 runtime=io.containerd.runc.v2\n" Feb 9 19:05:17.800905 env[1319]: time="2024-02-09T19:05:17.800857761Z" level=info msg="TearDown network for sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" successfully" Feb 9 19:05:17.800905 env[1319]: time="2024-02-09T19:05:17.800899062Z" level=info msg="StopPodSandbox for \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" returns successfully" Feb 9 19:05:17.823905 kubelet[2464]: I0209 19:05:17.823864 2464 topology_manager.go:215] "Topology Admit Handler" podUID="7f47c5b8-79f8-4929-a1f9-d1def46f3b0c" podNamespace="calico-system" podName="calico-typha-7b6b9cd7bf-xtx2j" Feb 9 19:05:17.824259 kubelet[2464]: E0209 19:05:17.824239 2464 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="fe483b07-909e-4d6e-80fc-bbacb7f97d19" containerName="calico-typha" Feb 9 19:05:17.824419 kubelet[2464]: I0209 19:05:17.824405 2464 memory_manager.go:346] "RemoveStaleState removing state" podUID="fe483b07-909e-4d6e-80fc-bbacb7f97d19" containerName="calico-typha" Feb 9 19:05:17.830461 systemd[1]: Created slice kubepods-besteffort-pod7f47c5b8_79f8_4929_a1f9_d1def46f3b0c.slice. Feb 9 19:05:17.842000 audit[3279]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.854875 kernel: audit: type=1325 audit(1707505517.842:1136): table=filter:101 family=2 entries=16 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.855031 kernel: audit: type=1300 audit(1707505517.842:1136): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe29fda480 a2=0 a3=7ffe29fda46c items=0 ppid=2638 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.842000 audit[3279]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe29fda480 a2=0 a3=7ffe29fda46c items=0 ppid=2638 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.886894 kernel: audit: type=1327 audit(1707505517.842:1136): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.875000 audit[3279]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.875000 audit[3279]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe29fda480 a2=0 a3=31030 items=0 ppid=2638 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.917987 kernel: audit: type=1325 audit(1707505517.875:1137): table=nat:102 family=2 entries=12 op=nft_register_rule pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.918120 kernel: audit: type=1300 audit(1707505517.875:1137): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe29fda480 a2=0 a3=31030 items=0 ppid=2638 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.926132 kubelet[2464]: I0209 19:05:17.920803 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe483b07-909e-4d6e-80fc-bbacb7f97d19-typha-certs\") pod \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " Feb 9 19:05:17.926132 kubelet[2464]: I0209 19:05:17.920863 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe483b07-909e-4d6e-80fc-bbacb7f97d19-tigera-ca-bundle\") pod \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " Feb 9 19:05:17.926132 kubelet[2464]: I0209 19:05:17.920890 2464 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-j7nds\" (UniqueName: \"kubernetes.io/projected/fe483b07-909e-4d6e-80fc-bbacb7f97d19-kube-api-access-j7nds\") pod \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\" (UID: \"fe483b07-909e-4d6e-80fc-bbacb7f97d19\") " Feb 9 19:05:17.926132 kubelet[2464]: I0209 19:05:17.920956 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7f47c5b8-79f8-4929-a1f9-d1def46f3b0c-typha-certs\") pod \"calico-typha-7b6b9cd7bf-xtx2j\" (UID: \"7f47c5b8-79f8-4929-a1f9-d1def46f3b0c\") " pod="calico-system/calico-typha-7b6b9cd7bf-xtx2j" Feb 9 19:05:17.926132 kubelet[2464]: I0209 19:05:17.920982 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7f47c5b8-79f8-4929-a1f9-d1def46f3b0c-tigera-ca-bundle\") pod \"calico-typha-7b6b9cd7bf-xtx2j\" (UID: \"7f47c5b8-79f8-4929-a1f9-d1def46f3b0c\") " pod="calico-system/calico-typha-7b6b9cd7bf-xtx2j" Feb 9 19:05:17.920127 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841-rootfs.mount: Deactivated successfully. Feb 9 19:05:17.926524 kubelet[2464]: I0209 19:05:17.921019 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k6ggx\" (UniqueName: \"kubernetes.io/projected/7f47c5b8-79f8-4929-a1f9-d1def46f3b0c-kube-api-access-k6ggx\") pod \"calico-typha-7b6b9cd7bf-xtx2j\" (UID: \"7f47c5b8-79f8-4929-a1f9-d1def46f3b0c\") " pod="calico-system/calico-typha-7b6b9cd7bf-xtx2j" Feb 9 19:05:17.920246 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a-rootfs.mount: Deactivated successfully. Feb 9 19:05:17.920305 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a-shm.mount: Deactivated successfully. Feb 9 19:05:17.928331 kernel: audit: type=1327 audit(1707505517.875:1137): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.903000 audit[3281]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.937468 systemd[1]: var-lib-kubelet-pods-fe483b07\x2d909e\x2d4d6e\x2d80fc\x2dbbacb7f97d19-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dj7nds.mount: Deactivated successfully. Feb 9 19:05:17.937564 systemd[1]: var-lib-kubelet-pods-fe483b07\x2d909e\x2d4d6e\x2d80fc\x2dbbacb7f97d19-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 9 19:05:17.940857 kernel: audit: type=1325 audit(1707505517.903:1138): table=filter:103 family=2 entries=16 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.941478 kubelet[2464]: I0209 19:05:17.941438 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/fe483b07-909e-4d6e-80fc-bbacb7f97d19-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "fe483b07-909e-4d6e-80fc-bbacb7f97d19" (UID: "fe483b07-909e-4d6e-80fc-bbacb7f97d19"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:05:17.903000 audit[3281]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff740f1240 a2=0 a3=7fff740f122c items=0 ppid=2638 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.947352 systemd[1]: var-lib-kubelet-pods-fe483b07\x2d909e\x2d4d6e\x2d80fc\x2dbbacb7f97d19-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 9 19:05:17.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.963000 kubelet[2464]: I0209 19:05:17.962965 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/fe483b07-909e-4d6e-80fc-bbacb7f97d19-kube-api-access-j7nds" (OuterVolumeSpecName: "kube-api-access-j7nds") pod "fe483b07-909e-4d6e-80fc-bbacb7f97d19" (UID: "fe483b07-909e-4d6e-80fc-bbacb7f97d19"). InnerVolumeSpecName "kube-api-access-j7nds". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:05:17.972374 kernel: audit: type=1300 audit(1707505517.903:1138): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff740f1240 a2=0 a3=7fff740f122c items=0 ppid=2638 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.972491 kernel: audit: type=1327 audit(1707505517.903:1138): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.924000 audit[3281]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:17.924000 audit[3281]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff740f1240 a2=0 a3=31030 items=0 ppid=2638 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:17.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:17.973746 kubelet[2464]: I0209 19:05:17.973710 2464 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/fe483b07-909e-4d6e-80fc-bbacb7f97d19-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "fe483b07-909e-4d6e-80fc-bbacb7f97d19" (UID: "fe483b07-909e-4d6e-80fc-bbacb7f97d19"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:05:18.022219 kubelet[2464]: I0209 19:05:18.022068 2464 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-j7nds\" (UniqueName: \"kubernetes.io/projected/fe483b07-909e-4d6e-80fc-bbacb7f97d19-kube-api-access-j7nds\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:18.022825 kubelet[2464]: I0209 19:05:18.022803 2464 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe483b07-909e-4d6e-80fc-bbacb7f97d19-typha-certs\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:18.023017 kubelet[2464]: I0209 19:05:18.023001 2464 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe483b07-909e-4d6e-80fc-bbacb7f97d19-tigera-ca-bundle\") on node \"ci-3510.3.2-a-dbdb6b501f\" DevicePath \"\"" Feb 9 19:05:18.117165 kubelet[2464]: I0209 19:05:18.117126 2464 scope.go:117] "RemoveContainer" containerID="e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841" Feb 9 19:05:18.119309 env[1319]: time="2024-02-09T19:05:18.119265747Z" level=info msg="RemoveContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\"" Feb 9 19:05:18.123690 systemd[1]: Removed slice kubepods-besteffort-podfe483b07_909e_4d6e_80fc_bbacb7f97d19.slice. Feb 9 19:05:18.133314 env[1319]: time="2024-02-09T19:05:18.133271351Z" level=info msg="RemoveContainer for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" returns successfully" Feb 9 19:05:18.133606 kubelet[2464]: I0209 19:05:18.133582 2464 scope.go:117] "RemoveContainer" containerID="e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841" Feb 9 19:05:18.134075 env[1319]: time="2024-02-09T19:05:18.133993557Z" level=error msg="ContainerStatus for \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\": not found" Feb 9 19:05:18.134232 kubelet[2464]: E0209 19:05:18.134210 2464 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\": not found" containerID="e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841" Feb 9 19:05:18.134309 kubelet[2464]: I0209 19:05:18.134256 2464 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841"} err="failed to get container status \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\": rpc error: code = NotFound desc = an error occurred when try to find container \"e27adcf3a71afa0f93c6fdbd7355eea63de9406139c33096582ab55502c42841\": not found" Feb 9 19:05:18.136383 env[1319]: time="2024-02-09T19:05:18.134820763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b6b9cd7bf-xtx2j,Uid:7f47c5b8-79f8-4929-a1f9-d1def46f3b0c,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:18.164763 env[1319]: time="2024-02-09T19:05:18.164663884Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:18.165003 env[1319]: time="2024-02-09T19:05:18.164772085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:18.165003 env[1319]: time="2024-02-09T19:05:18.164815585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:18.165126 env[1319]: time="2024-02-09T19:05:18.165024087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a50a78cf2d7dc7892af9c9173efc8a62e4f2fdbe45d6a05f3a10ae6a36f1fb21 pid=3296 runtime=io.containerd.runc.v2 Feb 9 19:05:18.178385 systemd[1]: Started cri-containerd-a50a78cf2d7dc7892af9c9173efc8a62e4f2fdbe45d6a05f3a10ae6a36f1fb21.scope. Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit: BPF prog-id=144 op=LOAD Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3296 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135306137386366326437646337383932616639633931373365666338 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3296 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135306137386366326437646337383932616639633931373365666338 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit: BPF prog-id=145 op=LOAD Feb 9 19:05:18.192000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308e80 items=0 ppid=3296 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135306137386366326437646337383932616639633931373365666338 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit: BPF prog-id=146 op=LOAD Feb 9 19:05:18.192000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308ec8 items=0 ppid=3296 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135306137386366326437646337383932616639633931373365666338 Feb 9 19:05:18.192000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:05:18.192000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.192000 audit: BPF prog-id=147 op=LOAD Feb 9 19:05:18.192000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003092d8 items=0 ppid=3296 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135306137386366326437646337383932616639633931373365666338 Feb 9 19:05:18.224673 env[1319]: time="2024-02-09T19:05:18.224627529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b6b9cd7bf-xtx2j,Uid:7f47c5b8-79f8-4929-a1f9-d1def46f3b0c,Namespace:calico-system,Attempt:0,} returns sandbox id \"a50a78cf2d7dc7892af9c9173efc8a62e4f2fdbe45d6a05f3a10ae6a36f1fb21\"" Feb 9 19:05:18.234071 env[1319]: time="2024-02-09T19:05:18.234027298Z" level=info msg="CreateContainer within sandbox \"a50a78cf2d7dc7892af9c9173efc8a62e4f2fdbe45d6a05f3a10ae6a36f1fb21\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:05:18.280546 env[1319]: time="2024-02-09T19:05:18.278515528Z" level=info msg="CreateContainer within sandbox \"a50a78cf2d7dc7892af9c9173efc8a62e4f2fdbe45d6a05f3a10ae6a36f1fb21\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3d86d20c7b591520a5a34da23ca38d122211e1c9046461380817c5b4e33d03c8\"" Feb 9 19:05:18.280960 env[1319]: time="2024-02-09T19:05:18.280928946Z" level=info msg="StartContainer for \"3d86d20c7b591520a5a34da23ca38d122211e1c9046461380817c5b4e33d03c8\"" Feb 9 19:05:18.299725 systemd[1]: Started cri-containerd-3d86d20c7b591520a5a34da23ca38d122211e1c9046461380817c5b4e33d03c8.scope. Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.318000 audit: BPF prog-id=148 op=LOAD Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3296 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364383664323063376235393135323061356133346461323363613338 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3296 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364383664323063376235393135323061356133346461323363613338 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit: BPF prog-id=149 op=LOAD Feb 9 19:05:18.319000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003a8150 items=0 ppid=3296 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364383664323063376235393135323061356133346461323363613338 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit: BPF prog-id=150 op=LOAD Feb 9 19:05:18.319000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003a8198 items=0 ppid=3296 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364383664323063376235393135323061356133346461323363613338 Feb 9 19:05:18.319000 audit: BPF prog-id=150 op=UNLOAD Feb 9 19:05:18.319000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:18.319000 audit: BPF prog-id=151 op=LOAD Feb 9 19:05:18.319000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003a85a8 items=0 ppid=3296 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:18.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364383664323063376235393135323061356133346461323363613338 Feb 9 19:05:18.355437 env[1319]: time="2024-02-09T19:05:18.355384098Z" level=info msg="StartContainer for \"3d86d20c7b591520a5a34da23ca38d122211e1c9046461380817c5b4e33d03c8\" returns successfully" Feb 9 19:05:19.006574 kubelet[2464]: E0209 19:05:19.006542 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:19.012042 kubelet[2464]: I0209 19:05:19.012003 2464 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="fe483b07-909e-4d6e-80fc-bbacb7f97d19" path="/var/lib/kubelet/pods/fe483b07-909e-4d6e-80fc-bbacb7f97d19/volumes" Feb 9 19:05:19.149308 kubelet[2464]: I0209 19:05:19.149251 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7b6b9cd7bf-xtx2j" podStartSLOduration=12.149204966 podCreationTimestamp="2024-02-09 19:05:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:05:19.138530788 +0000 UTC m=+32.322695641" watchObservedRunningTime="2024-02-09 19:05:19.149204966 +0000 UTC m=+32.333369819" Feb 9 19:05:19.169000 audit[3373]: NETFILTER_CFG table=filter:105 family=2 entries=15 op=nft_register_rule pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:19.169000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd9ea96b50 a2=0 a3=7ffd9ea96b3c items=0 ppid=2638 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:19.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:19.170000 audit[3373]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:19.170000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd9ea96b50 a2=0 a3=7ffd9ea96b3c items=0 ppid=2638 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:19.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:21.012249 kubelet[2464]: E0209 19:05:21.007241 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:23.009453 kubelet[2464]: E0209 19:05:23.007207 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:24.729939 env[1319]: time="2024-02-09T19:05:24.729880909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:24.734380 env[1319]: time="2024-02-09T19:05:24.734339839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:24.737812 env[1319]: time="2024-02-09T19:05:24.737773862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:24.745296 env[1319]: time="2024-02-09T19:05:24.745258712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:24.746075 env[1319]: time="2024-02-09T19:05:24.746038218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:05:24.749534 env[1319]: time="2024-02-09T19:05:24.748670935Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:05:24.777561 env[1319]: time="2024-02-09T19:05:24.777500730Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6\"" Feb 9 19:05:24.780205 env[1319]: time="2024-02-09T19:05:24.778315335Z" level=info msg="StartContainer for \"3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6\"" Feb 9 19:05:24.813596 systemd[1]: run-containerd-runc-k8s.io-3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6-runc.Msb9zs.mount: Deactivated successfully. Feb 9 19:05:24.816699 systemd[1]: Started cri-containerd-3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6.scope. Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.838502 kernel: kauditd_printk_skb: 123 callbacks suppressed Feb 9 19:05:24.838605 kernel: audit: type=1400 audit(1707505524.832:1178): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3076 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:24.876888 kernel: audit: type=1300 audit(1707505524.832:1178): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3076 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:24.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353937343734643038376664306538653831616166336639356234 Feb 9 19:05:24.898866 kernel: audit: type=1327 audit(1707505524.832:1178): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353937343734643038376664306538653831616166336639356234 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.911056 env[1319]: time="2024-02-09T19:05:24.911009229Z" level=info msg="StartContainer for \"3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6\" returns successfully" Feb 9 19:05:24.914896 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.946985 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.947114 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.962273 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.991728 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.991882 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.832000 audit: BPF prog-id=152 op=LOAD Feb 9 19:05:24.832000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000edeb0 items=0 ppid=3076 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:24.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353937343734643038376664306538653831616166336639356234 Feb 9 19:05:25.006868 kernel: audit: type=1400 audit(1707505524.832:1179): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:25.008446 kubelet[2464]: E0209 19:05:25.007972 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit: BPF prog-id=153 op=LOAD Feb 9 19:05:24.852000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000231e98 items=0 ppid=3076 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353937343734643038376664306538653831616166336639356234 Feb 9 19:05:24.852000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:05:24.852000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:24.852000 audit: BPF prog-id=154 op=LOAD Feb 9 19:05:24.852000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000231f28 items=0 ppid=3076 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364353937343734643038376664306538653831616166336639356234 Feb 9 19:05:26.608512 systemd[1]: cri-containerd-3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6.scope: Deactivated successfully. Feb 9 19:05:26.611000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:05:26.631241 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6-rootfs.mount: Deactivated successfully. Feb 9 19:05:26.644592 kubelet[2464]: I0209 19:05:26.643704 2464 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:05:26.675534 kubelet[2464]: I0209 19:05:26.675493 2464 topology_manager.go:215] "Topology Admit Handler" podUID="8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4" podNamespace="calico-system" podName="calico-kube-controllers-55bfffb994-jtphf" Feb 9 19:05:27.221974 kubelet[2464]: I0209 19:05:26.679677 2464 topology_manager.go:215] "Topology Admit Handler" podUID="31883a80-bb4b-47b6-a395-71ebea529eef" podNamespace="kube-system" podName="coredns-5dd5756b68-zgddb" Feb 9 19:05:27.221974 kubelet[2464]: I0209 19:05:26.683056 2464 topology_manager.go:215] "Topology Admit Handler" podUID="635faf4e-87e9-4ce6-b747-05caf0570c82" podNamespace="kube-system" podName="coredns-5dd5756b68-nqqx4" Feb 9 19:05:27.221974 kubelet[2464]: W0209 19:05:26.693051 2464 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-dbdb6b501f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-dbdb6b501f' and this object Feb 9 19:05:27.221974 kubelet[2464]: E0209 19:05:26.693098 2464 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-dbdb6b501f" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-dbdb6b501f' and this object Feb 9 19:05:27.221974 kubelet[2464]: I0209 19:05:26.787556 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/635faf4e-87e9-4ce6-b747-05caf0570c82-config-volume\") pod \"coredns-5dd5756b68-nqqx4\" (UID: \"635faf4e-87e9-4ce6-b747-05caf0570c82\") " pod="kube-system/coredns-5dd5756b68-nqqx4" Feb 9 19:05:27.221974 kubelet[2464]: I0209 19:05:26.787603 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rw689\" (UniqueName: \"kubernetes.io/projected/8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4-kube-api-access-rw689\") pod \"calico-kube-controllers-55bfffb994-jtphf\" (UID: \"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4\") " pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" Feb 9 19:05:26.686246 systemd[1]: Created slice kubepods-besteffort-pod8e8b3ddf_9ff2_41d1_9b8b_69101d80f6b4.slice. Feb 9 19:05:27.222468 kubelet[2464]: I0209 19:05:26.787628 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4-tigera-ca-bundle\") pod \"calico-kube-controllers-55bfffb994-jtphf\" (UID: \"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4\") " pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" Feb 9 19:05:27.222468 kubelet[2464]: I0209 19:05:26.787653 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7w8m2\" (UniqueName: \"kubernetes.io/projected/31883a80-bb4b-47b6-a395-71ebea529eef-kube-api-access-7w8m2\") pod \"coredns-5dd5756b68-zgddb\" (UID: \"31883a80-bb4b-47b6-a395-71ebea529eef\") " pod="kube-system/coredns-5dd5756b68-zgddb" Feb 9 19:05:27.222468 kubelet[2464]: I0209 19:05:26.787673 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/31883a80-bb4b-47b6-a395-71ebea529eef-config-volume\") pod \"coredns-5dd5756b68-zgddb\" (UID: \"31883a80-bb4b-47b6-a395-71ebea529eef\") " pod="kube-system/coredns-5dd5756b68-zgddb" Feb 9 19:05:27.222468 kubelet[2464]: I0209 19:05:26.787700 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5tq7g\" (UniqueName: \"kubernetes.io/projected/635faf4e-87e9-4ce6-b747-05caf0570c82-kube-api-access-5tq7g\") pod \"coredns-5dd5756b68-nqqx4\" (UID: \"635faf4e-87e9-4ce6-b747-05caf0570c82\") " pod="kube-system/coredns-5dd5756b68-nqqx4" Feb 9 19:05:26.696338 systemd[1]: Created slice kubepods-burstable-pod31883a80_bb4b_47b6_a395_71ebea529eef.slice. Feb 9 19:05:26.708942 systemd[1]: Created slice kubepods-burstable-pod635faf4e_87e9_4ce6_b747_05caf0570c82.slice. Feb 9 19:05:27.013068 systemd[1]: Created slice kubepods-besteffort-pode66e7c92_500b_4b98_8b54_ad6bf0e951c2.slice. Feb 9 19:05:27.228715 env[1319]: time="2024-02-09T19:05:27.228176271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-djrwv,Uid:e66e7c92-500b-4b98-8b54-ad6bf0e951c2,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:27.531760 env[1319]: time="2024-02-09T19:05:27.531061122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55bfffb994-jtphf,Uid:8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4,Namespace:calico-system,Attempt:0,}" Feb 9 19:05:27.890031 kubelet[2464]: E0209 19:05:27.889970 2464 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:05:27.890587 kubelet[2464]: E0209 19:05:27.890109 2464 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/31883a80-bb4b-47b6-a395-71ebea529eef-config-volume podName:31883a80-bb4b-47b6-a395-71ebea529eef nodeName:}" failed. No retries permitted until 2024-02-09 19:05:28.390078435 +0000 UTC m=+41.574243288 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/31883a80-bb4b-47b6-a395-71ebea529eef-config-volume") pod "coredns-5dd5756b68-zgddb" (UID: "31883a80-bb4b-47b6-a395-71ebea529eef") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:05:27.890747 kubelet[2464]: E0209 19:05:27.889971 2464 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:05:27.890932 kubelet[2464]: E0209 19:05:27.890918 2464 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/635faf4e-87e9-4ce6-b747-05caf0570c82-config-volume podName:635faf4e-87e9-4ce6-b747-05caf0570c82 nodeName:}" failed. No retries permitted until 2024-02-09 19:05:28.39089404 +0000 UTC m=+41.575058993 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/635faf4e-87e9-4ce6-b747-05caf0570c82-config-volume") pod "coredns-5dd5756b68-nqqx4" (UID: "635faf4e-87e9-4ce6-b747-05caf0570c82") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:05:28.325971 env[1319]: time="2024-02-09T19:05:28.325907612Z" level=info msg="shim disconnected" id=3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6 Feb 9 19:05:28.325971 env[1319]: time="2024-02-09T19:05:28.325967313Z" level=warning msg="cleaning up after shim disconnected" id=3d597474d087fd0e8e81aaf3f95b443153143576eaf4ae974393c16941e680e6 namespace=k8s.io Feb 9 19:05:28.325971 env[1319]: time="2024-02-09T19:05:28.325980413Z" level=info msg="cleaning up dead shim" Feb 9 19:05:28.335438 env[1319]: time="2024-02-09T19:05:28.335374573Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:05:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3435 runtime=io.containerd.runc.v2\n" Feb 9 19:05:28.424362 env[1319]: time="2024-02-09T19:05:28.424307337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nqqx4,Uid:635faf4e-87e9-4ce6-b747-05caf0570c82,Namespace:kube-system,Attempt:0,}" Feb 9 19:05:28.424880 env[1319]: time="2024-02-09T19:05:28.424723040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zgddb,Uid:31883a80-bb4b-47b6-a395-71ebea529eef,Namespace:kube-system,Attempt:0,}" Feb 9 19:05:28.451988 env[1319]: time="2024-02-09T19:05:28.451895913Z" level=error msg="Failed to destroy network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.457471 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c-shm.mount: Deactivated successfully. Feb 9 19:05:28.459335 env[1319]: time="2024-02-09T19:05:28.459245659Z" level=error msg="encountered an error cleaning up failed sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.459458 env[1319]: time="2024-02-09T19:05:28.459417760Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-djrwv,Uid:e66e7c92-500b-4b98-8b54-ad6bf0e951c2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.459833 kubelet[2464]: E0209 19:05:28.459781 2464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.459975 kubelet[2464]: E0209 19:05:28.459888 2464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:28.459975 kubelet[2464]: E0209 19:05:28.459921 2464 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-djrwv" Feb 9 19:05:28.460134 kubelet[2464]: E0209 19:05:28.460057 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-djrwv_calico-system(e66e7c92-500b-4b98-8b54-ad6bf0e951c2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-djrwv_calico-system(e66e7c92-500b-4b98-8b54-ad6bf0e951c2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:28.465007 env[1319]: time="2024-02-09T19:05:28.464964996Z" level=error msg="Failed to destroy network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.465439 env[1319]: time="2024-02-09T19:05:28.465409898Z" level=error msg="encountered an error cleaning up failed sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.465569 env[1319]: time="2024-02-09T19:05:28.465538699Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55bfffb994-jtphf,Uid:8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.465920 kubelet[2464]: E0209 19:05:28.465898 2464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.466035 kubelet[2464]: E0209 19:05:28.465966 2464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" Feb 9 19:05:28.466035 kubelet[2464]: E0209 19:05:28.466012 2464 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" Feb 9 19:05:28.466136 kubelet[2464]: E0209 19:05:28.466096 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55bfffb994-jtphf_calico-system(8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55bfffb994-jtphf_calico-system(8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" podUID="8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4" Feb 9 19:05:28.556555 env[1319]: time="2024-02-09T19:05:28.556478077Z" level=error msg="Failed to destroy network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.556943 env[1319]: time="2024-02-09T19:05:28.556894779Z" level=error msg="encountered an error cleaning up failed sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.557050 env[1319]: time="2024-02-09T19:05:28.556968480Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zgddb,Uid:31883a80-bb4b-47b6-a395-71ebea529eef,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.557591 kubelet[2464]: E0209 19:05:28.557274 2464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.557591 kubelet[2464]: E0209 19:05:28.557345 2464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-zgddb" Feb 9 19:05:28.557591 kubelet[2464]: E0209 19:05:28.557381 2464 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-zgddb" Feb 9 19:05:28.557822 kubelet[2464]: E0209 19:05:28.557457 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-zgddb_kube-system(31883a80-bb4b-47b6-a395-71ebea529eef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-zgddb_kube-system(31883a80-bb4b-47b6-a395-71ebea529eef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-zgddb" podUID="31883a80-bb4b-47b6-a395-71ebea529eef" Feb 9 19:05:28.568306 env[1319]: time="2024-02-09T19:05:28.568253751Z" level=error msg="Failed to destroy network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.568667 env[1319]: time="2024-02-09T19:05:28.568621954Z" level=error msg="encountered an error cleaning up failed sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.568806 env[1319]: time="2024-02-09T19:05:28.568697354Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nqqx4,Uid:635faf4e-87e9-4ce6-b747-05caf0570c82,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.569038 kubelet[2464]: E0209 19:05:28.569017 2464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:28.569132 kubelet[2464]: E0209 19:05:28.569079 2464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nqqx4" Feb 9 19:05:28.569132 kubelet[2464]: E0209 19:05:28.569110 2464 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nqqx4" Feb 9 19:05:28.569227 kubelet[2464]: E0209 19:05:28.569182 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-nqqx4_kube-system(635faf4e-87e9-4ce6-b747-05caf0570c82)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-nqqx4_kube-system(635faf4e-87e9-4ce6-b747-05caf0570c82)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nqqx4" podUID="635faf4e-87e9-4ce6-b747-05caf0570c82" Feb 9 19:05:29.145101 kubelet[2464]: I0209 19:05:29.145062 2464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:29.147982 env[1319]: time="2024-02-09T19:05:29.146133708Z" level=info msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" Feb 9 19:05:29.153098 kubelet[2464]: I0209 19:05:29.153073 2464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:29.153588 env[1319]: time="2024-02-09T19:05:29.153553155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:05:29.157006 env[1319]: time="2024-02-09T19:05:29.156973976Z" level=info msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" Feb 9 19:05:29.160686 kubelet[2464]: I0209 19:05:29.160661 2464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:29.161387 env[1319]: time="2024-02-09T19:05:29.161354604Z" level=info msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" Feb 9 19:05:29.162593 kubelet[2464]: I0209 19:05:29.162577 2464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:29.163221 env[1319]: time="2024-02-09T19:05:29.163190715Z" level=info msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" Feb 9 19:05:29.214048 env[1319]: time="2024-02-09T19:05:29.213973433Z" level=error msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" failed" error="failed to destroy network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:29.214820 kubelet[2464]: E0209 19:05:29.214550 2464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:29.214820 kubelet[2464]: E0209 19:05:29.214637 2464 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4"} Feb 9 19:05:29.214820 kubelet[2464]: E0209 19:05:29.214707 2464 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31883a80-bb4b-47b6-a395-71ebea529eef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:05:29.214820 kubelet[2464]: E0209 19:05:29.214754 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31883a80-bb4b-47b6-a395-71ebea529eef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-zgddb" podUID="31883a80-bb4b-47b6-a395-71ebea529eef" Feb 9 19:05:29.251221 env[1319]: time="2024-02-09T19:05:29.250708863Z" level=error msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" failed" error="failed to destroy network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:29.252480 kubelet[2464]: E0209 19:05:29.251912 2464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:29.252480 kubelet[2464]: E0209 19:05:29.251982 2464 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce"} Feb 9 19:05:29.252480 kubelet[2464]: E0209 19:05:29.252053 2464 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"635faf4e-87e9-4ce6-b747-05caf0570c82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:05:29.252480 kubelet[2464]: E0209 19:05:29.252439 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"635faf4e-87e9-4ce6-b747-05caf0570c82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nqqx4" podUID="635faf4e-87e9-4ce6-b747-05caf0570c82" Feb 9 19:05:29.256893 env[1319]: time="2024-02-09T19:05:29.256823301Z" level=error msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" failed" error="failed to destroy network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:29.257160 kubelet[2464]: E0209 19:05:29.257143 2464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:29.257250 kubelet[2464]: E0209 19:05:29.257181 2464 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69"} Feb 9 19:05:29.257250 kubelet[2464]: E0209 19:05:29.257238 2464 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:05:29.257371 kubelet[2464]: E0209 19:05:29.257287 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" podUID="8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4" Feb 9 19:05:29.268404 env[1319]: time="2024-02-09T19:05:29.268339173Z" level=error msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" failed" error="failed to destroy network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:05:29.268616 kubelet[2464]: E0209 19:05:29.268595 2464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:29.268707 kubelet[2464]: E0209 19:05:29.268636 2464 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c"} Feb 9 19:05:29.268707 kubelet[2464]: E0209 19:05:29.268685 2464 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:05:29.268830 kubelet[2464]: E0209 19:05:29.268724 2464 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e66e7c92-500b-4b98-8b54-ad6bf0e951c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-djrwv" podUID="e66e7c92-500b-4b98-8b54-ad6bf0e951c2" Feb 9 19:05:29.356560 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69-shm.mount: Deactivated successfully. Feb 9 19:05:37.343675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount858507945.mount: Deactivated successfully. Feb 9 19:05:37.445799 env[1319]: time="2024-02-09T19:05:37.445732929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:37.451561 env[1319]: time="2024-02-09T19:05:37.451505762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:37.454340 env[1319]: time="2024-02-09T19:05:37.454289378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:37.456822 env[1319]: time="2024-02-09T19:05:37.456785092Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:37.457239 env[1319]: time="2024-02-09T19:05:37.457207094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:05:37.478359 env[1319]: time="2024-02-09T19:05:37.478310613Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:05:37.510426 env[1319]: time="2024-02-09T19:05:37.510362294Z" level=info msg="CreateContainer within sandbox \"2b67febf775f10b02d0f2dd06cf7ae99b51272d0758e6f9103beacd1a450b018\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8\"" Feb 9 19:05:37.512612 env[1319]: time="2024-02-09T19:05:37.512075204Z" level=info msg="StartContainer for \"7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8\"" Feb 9 19:05:37.532175 systemd[1]: Started cri-containerd-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8.scope. Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.561298 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:05:37.561422 kernel: audit: type=1400 audit(1707505537.553:1185): avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.573125 kernel: audit: type=1300 audit(1707505537.553:1185): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3076 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:37.553000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3076 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383737353463643739353430646162366231656163656139633836 Feb 9 19:05:37.618154 kernel: audit: type=1327 audit(1707505537.553:1185): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383737353463643739353430646162366231656163656139633836 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.635090 env[1319]: time="2024-02-09T19:05:37.632773085Z" level=info msg="StartContainer for \"7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8\" returns successfully" Feb 9 19:05:37.646126 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.646282 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.674274 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.674437 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.688153 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.688372 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.703375 kernel: audit: type=1400 audit(1707505537.553:1186): avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit: BPF prog-id=155 op=LOAD Feb 9 19:05:37.553000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002a1840 items=0 ppid=3076 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383737353463643739353430646162366231656163656139633836 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit: BPF prog-id=156 op=LOAD Feb 9 19:05:37.553000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002a1888 items=0 ppid=3076 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383737353463643739353430646162366231656163656139633836 Feb 9 19:05:37.553000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:05:37.553000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { perfmon } for pid=3670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit[3670]: AVC avc: denied { bpf } for pid=3670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:37.553000 audit: BPF prog-id=157 op=LOAD Feb 9 19:05:37.553000 audit[3670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002a1918 items=0 ppid=3076 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:37.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383737353463643739353430646162366231656163656139633836 Feb 9 19:05:37.912683 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:05:37.912928 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:05:39.407000 audit[3810]: AVC avc: denied { write } for pid=3810 comm="tee" name="fd" dev="proc" ino=30584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.407000 audit[3810]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffede0e3971 a2=241 a3=1b6 items=1 ppid=3777 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.426000 audit[3829]: AVC avc: denied { write } for pid=3829 comm="tee" name="fd" dev="proc" ino=30590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.426000 audit[3829]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5f180971 a2=241 a3=1b6 items=1 ppid=3782 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.426000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:05:39.426000 audit: PATH item=0 name="/dev/fd/63" inode=31139 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.426000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.434000 audit[3827]: AVC avc: denied { write } for pid=3827 comm="tee" name="fd" dev="proc" ino=31142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.407000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:05:39.407000 audit: PATH item=0 name="/dev/fd/63" inode=30563 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.407000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.442000 audit[3820]: AVC avc: denied { write } for pid=3820 comm="tee" name="fd" dev="proc" ino=30599 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.442000 audit[3820]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb6c1a961 a2=241 a3=1b6 items=1 ppid=3780 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.442000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:05:39.442000 audit: PATH item=0 name="/dev/fd/63" inode=30581 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.442000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.434000 audit[3827]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc82aec973 a2=241 a3=1b6 items=1 ppid=3779 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.434000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:05:39.434000 audit: PATH item=0 name="/dev/fd/63" inode=31138 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.459000 audit[3839]: AVC avc: denied { write } for pid=3839 comm="tee" name="fd" dev="proc" ino=31153 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.459000 audit[3839]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3af0c962 a2=241 a3=1b6 items=1 ppid=3788 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.459000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:05:39.459000 audit: PATH item=0 name="/dev/fd/63" inode=31146 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.465000 audit[3822]: AVC avc: denied { write } for pid=3822 comm="tee" name="fd" dev="proc" ino=31157 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.465000 audit[3822]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd68a41972 a2=241 a3=1b6 items=1 ppid=3784 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.465000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:05:39.465000 audit: PATH item=0 name="/dev/fd/63" inode=31131 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:39.474000 audit[3841]: AVC avc: denied { write } for pid=3841 comm="tee" name="fd" dev="proc" ino=31161 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:05:39.474000 audit[3841]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff52ae5971 a2=241 a3=1b6 items=1 ppid=3783 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:39.474000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:05:39.474000 audit: PATH item=0 name="/dev/fd/63" inode=31149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:05:39.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.012000 audit: BPF prog-id=158 op=LOAD Feb 9 19:05:40.012000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6674b240 a2=70 a3=7f8671ebc000 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.014184 env[1319]: time="2024-02-09T19:05:40.013952119Z" level=info msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" Feb 9 19:05:40.012000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.015000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit: BPF prog-id=159 op=LOAD Feb 9 19:05:40.015000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6674b240 a2=70 a3=6e items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.015000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6674b1f0 a2=70 a3=7fff6674b240 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit: BPF prog-id=160 op=LOAD Feb 9 19:05:40.015000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff6674b1d0 a2=70 a3=7fff6674b240 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.015000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6674b2b0 a2=70 a3=0 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.015000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.015000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6674b2a0 a2=70 a3=0 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff6674b2e0 a2=70 a3=0 items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.016000 audit: BPF prog-id=161 op=LOAD Feb 9 19:05:40.016000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff6674b200 a2=70 a3=ffffffff items=0 ppid=3778 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:05:40.028000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.028000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcda3c3b80 a2=70 a3=fff80800 items=0 ppid=3778 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.028000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:05:40.028000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.028000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcda3c3a50 a2=70 a3=3 items=0 ppid=3778 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.028000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:05:40.036000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:05:40.092193 kubelet[2464]: I0209 19:05:40.092154 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-fjfqp" podStartSLOduration=3.741720101 podCreationTimestamp="2024-02-09 19:05:13 +0000 UTC" firstStartedPulling="2024-02-09 19:05:14.107270653 +0000 UTC m=+27.291435506" lastFinishedPulling="2024-02-09 19:05:37.457652697 +0000 UTC m=+50.641817550" observedRunningTime="2024-02-09 19:05:38.23738718 +0000 UTC m=+51.421552033" watchObservedRunningTime="2024-02-09 19:05:40.092102145 +0000 UTC m=+53.276267098" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.094 [INFO][3938] k8s.go 578: Cleaning up netns ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.094 [INFO][3938] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" iface="eth0" netns="/var/run/netns/cni-58029f05-1c0f-3116-6b9b-aac166379d57" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.094 [INFO][3938] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" iface="eth0" netns="/var/run/netns/cni-58029f05-1c0f-3116-6b9b-aac166379d57" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.095 [INFO][3938] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" iface="eth0" netns="/var/run/netns/cni-58029f05-1c0f-3116-6b9b-aac166379d57" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.095 [INFO][3938] k8s.go 585: Releasing IP address(es) ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.095 [INFO][3938] utils.go 188: Calico CNI releasing IP address ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.132 [INFO][3952] ipam_plugin.go 415: Releasing address using handleID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.133 [INFO][3952] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.133 [INFO][3952] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.144 [WARNING][3952] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.144 [INFO][3952] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.146 [INFO][3952] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:40.148710 env[1319]: 2024-02-09 19:05:40.147 [INFO][3938] k8s.go 591: Teardown processing complete. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:40.154487 env[1319]: time="2024-02-09T19:05:40.148925154Z" level=info msg="TearDown network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" successfully" Feb 9 19:05:40.154487 env[1319]: time="2024-02-09T19:05:40.148971155Z" level=info msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" returns successfully" Feb 9 19:05:40.154487 env[1319]: time="2024-02-09T19:05:40.149837359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nqqx4,Uid:635faf4e-87e9-4ce6-b747-05caf0570c82,Namespace:kube-system,Attempt:1,}" Feb 9 19:05:40.151645 systemd[1]: run-netns-cni\x2d58029f05\x2d1c0f\x2d3116\x2d6b9b\x2daac166379d57.mount: Deactivated successfully. Feb 9 19:05:40.323000 audit[3989]: NETFILTER_CFG table=mangle:107 family=2 entries=19 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:40.323000 audit[3989]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffea2651340 a2=0 a3=7ffea265132c items=0 ppid=3778 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.323000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:40.332000 audit[3988]: NETFILTER_CFG table=nat:108 family=2 entries=16 op=nft_register_chain pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:40.332000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffca3ffb20 a2=0 a3=7fffca3ffb0c items=0 ppid=3778 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:40.373523 systemd-networkd[1450]: calidce0ee29d19: Link UP Feb 9 19:05:40.374000 audit[3987]: NETFILTER_CFG table=raw:109 family=2 entries=19 op=nft_register_chain pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:40.374000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffebded9430 a2=0 a3=561236a41000 items=0 ppid=3778 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.374000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:40.382811 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidce0ee29d19: link becomes ready Feb 9 19:05:40.382095 systemd-networkd[1450]: calidce0ee29d19: Gained carrier Feb 9 19:05:40.395000 audit[3994]: NETFILTER_CFG table=filter:110 family=2 entries=39 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:40.395000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff8e785970 a2=0 a3=7fff8e78595c items=0 ppid=3778 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.243 [INFO][3961] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0 coredns-5dd5756b68- kube-system 635faf4e-87e9-4ce6-b747-05caf0570c82 779 0 2024-02-09 19:05:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f coredns-5dd5756b68-nqqx4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidce0ee29d19 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.243 [INFO][3961] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.294 [INFO][3973] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" HandleID="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.308 [INFO][3973] ipam_plugin.go 268: Auto assigning IP ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" HandleID="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051530), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"coredns-5dd5756b68-nqqx4", "timestamp":"2024-02-09 19:05:40.294198446 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.308 [INFO][3973] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.308 [INFO][3973] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.308 [INFO][3973] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.310 [INFO][3973] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.316 [INFO][3973] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.328 [INFO][3973] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.334 [INFO][3973] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.337 [INFO][3973] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.337 [INFO][3973] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.339 [INFO][3973] ipam.go 1682: Creating new handle: k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11 Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.344 [INFO][3973] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.358 [INFO][3973] ipam.go 1216: Successfully claimed IPs: [192.168.64.193/26] block=192.168.64.192/26 handle="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.358 [INFO][3973] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.193/26] handle="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.358 [INFO][3973] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:40.406965 env[1319]: 2024-02-09 19:05:40.359 [INFO][3973] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.193/26] IPv6=[] ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" HandleID="k8s-pod-network.b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.362 [INFO][3961] k8s.go 385: Populated endpoint ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"635faf4e-87e9-4ce6-b747-05caf0570c82", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"coredns-5dd5756b68-nqqx4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidce0ee29d19", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.362 [INFO][3961] k8s.go 386: Calico CNI using IPs: [192.168.64.193/32] ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.363 [INFO][3961] dataplane_linux.go 68: Setting the host side veth name to calidce0ee29d19 ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.383 [INFO][3961] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.393 [INFO][3961] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"635faf4e-87e9-4ce6-b747-05caf0570c82", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11", Pod:"coredns-5dd5756b68-nqqx4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidce0ee29d19", MAC:"2a:2a:c9:88:50:7d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:40.408014 env[1319]: 2024-02-09 19:05:40.403 [INFO][3961] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11" Namespace="kube-system" Pod="coredns-5dd5756b68-nqqx4" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:40.432393 env[1319]: time="2024-02-09T19:05:40.432316098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:40.432603 env[1319]: time="2024-02-09T19:05:40.432410199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:40.432603 env[1319]: time="2024-02-09T19:05:40.432447899Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:40.432746 env[1319]: time="2024-02-09T19:05:40.432610700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11 pid=4014 runtime=io.containerd.runc.v2 Feb 9 19:05:40.467821 systemd[1]: Started cri-containerd-b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11.scope. Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.489000 audit: BPF prog-id=162 op=LOAD Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4014 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306136363033396165316161613762386239333434373463373664 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4014 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306136363033396165316161613762386239333434373463373664 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit: BPF prog-id=163 op=LOAD Feb 9 19:05:40.490000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002185a0 items=0 ppid=4014 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306136363033396165316161613762386239333434373463373664 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.490000 audit: BPF prog-id=164 op=LOAD Feb 9 19:05:40.490000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002185e8 items=0 ppid=4014 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306136363033396165316161613762386239333434373463373664 Feb 9 19:05:40.491000 audit: BPF prog-id=164 op=UNLOAD Feb 9 19:05:40.491000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.491000 audit: BPF prog-id=165 op=LOAD Feb 9 19:05:40.491000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002189f8 items=0 ppid=4014 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306136363033396165316161613762386239333434373463373664 Feb 9 19:05:40.499000 audit[4042]: NETFILTER_CFG table=filter:111 family=2 entries=36 op=nft_register_chain pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:40.499000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcb35b5dc0 a2=0 a3=7ffcb35b5dac items=0 ppid=3778 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:40.535016 env[1319]: time="2024-02-09T19:05:40.534958357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nqqx4,Uid:635faf4e-87e9-4ce6-b747-05caf0570c82,Namespace:kube-system,Attempt:1,} returns sandbox id \"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11\"" Feb 9 19:05:40.538729 env[1319]: time="2024-02-09T19:05:40.538687078Z" level=info msg="CreateContainer within sandbox \"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:05:40.567157 env[1319]: time="2024-02-09T19:05:40.567109232Z" level=info msg="CreateContainer within sandbox \"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2f7f522ffc5630867528f2c53d32c6d3d9bacc0d7dfc16ab3ccddd4f5a98751f\"" Feb 9 19:05:40.569487 env[1319]: time="2024-02-09T19:05:40.569455145Z" level=info msg="StartContainer for \"2f7f522ffc5630867528f2c53d32c6d3d9bacc0d7dfc16ab3ccddd4f5a98751f\"" Feb 9 19:05:40.587159 systemd[1]: Started cri-containerd-2f7f522ffc5630867528f2c53d32c6d3d9bacc0d7dfc16ab3ccddd4f5a98751f.scope. Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.606000 audit: BPF prog-id=166 op=LOAD Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4014 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376635323266666335363330383637353238663263353364333263 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4014 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376635323266666335363330383637353238663263353364333263 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit: BPF prog-id=167 op=LOAD Feb 9 19:05:40.608000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000300440 items=0 ppid=4014 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376635323266666335363330383637353238663263353364333263 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit: BPF prog-id=168 op=LOAD Feb 9 19:05:40.608000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000300488 items=0 ppid=4014 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376635323266666335363330383637353238663263353364333263 Feb 9 19:05:40.608000 audit: BPF prog-id=168 op=UNLOAD Feb 9 19:05:40.608000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:40.608000 audit: BPF prog-id=169 op=LOAD Feb 9 19:05:40.608000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000300898 items=0 ppid=4014 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:40.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376635323266666335363330383637353238663263353364333263 Feb 9 19:05:40.633828 env[1319]: time="2024-02-09T19:05:40.633776396Z" level=info msg="StartContainer for \"2f7f522ffc5630867528f2c53d32c6d3d9bacc0d7dfc16ab3ccddd4f5a98751f\" returns successfully" Feb 9 19:05:40.757324 systemd-networkd[1450]: vxlan.calico: Link UP Feb 9 19:05:40.757337 systemd-networkd[1450]: vxlan.calico: Gained carrier Feb 9 19:05:41.247089 kubelet[2464]: I0209 19:05:41.247040 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-nqqx4" podStartSLOduration=40.246916821 podCreationTimestamp="2024-02-09 19:05:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:05:41.227965419 +0000 UTC m=+54.412130272" watchObservedRunningTime="2024-02-09 19:05:41.246916821 +0000 UTC m=+54.431081674" Feb 9 19:05:41.260000 audit[4093]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:41.260000 audit[4093]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe34d67c40 a2=0 a3=7ffe34d67c2c items=0 ppid=2638 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:41.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:41.261000 audit[4093]: NETFILTER_CFG table=nat:113 family=2 entries=14 op=nft_register_rule pid=4093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:41.261000 audit[4093]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffe34d67c40 a2=0 a3=31030 items=0 ppid=2638 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:41.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:41.274000 audit[4095]: NETFILTER_CFG table=filter:114 family=2 entries=11 op=nft_register_rule pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:41.274000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc412bd380 a2=0 a3=7ffc412bd36c items=0 ppid=2638 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:41.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:41.276000 audit[4095]: NETFILTER_CFG table=nat:115 family=2 entries=35 op=nft_register_chain pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:41.276000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc412bd380 a2=0 a3=7ffc412bd36c items=0 ppid=2638 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:41.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:41.876047 systemd-networkd[1450]: calidce0ee29d19: Gained IPv6LL Feb 9 19:05:42.007893 env[1319]: time="2024-02-09T19:05:42.007754119Z" level=info msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" Feb 9 19:05:42.008580 env[1319]: time="2024-02-09T19:05:42.008515123Z" level=info msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.080 [INFO][4125] k8s.go 578: Cleaning up netns ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.080 [INFO][4125] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" iface="eth0" netns="/var/run/netns/cni-badebdce-2189-705f-7939-71819b9abfb3" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.080 [INFO][4125] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" iface="eth0" netns="/var/run/netns/cni-badebdce-2189-705f-7939-71819b9abfb3" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.081 [INFO][4125] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" iface="eth0" netns="/var/run/netns/cni-badebdce-2189-705f-7939-71819b9abfb3" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.081 [INFO][4125] k8s.go 585: Releasing IP address(es) ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.081 [INFO][4125] utils.go 188: Calico CNI releasing IP address ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.128 [INFO][4139] ipam_plugin.go 415: Releasing address using handleID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.128 [INFO][4139] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.129 [INFO][4139] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.144 [WARNING][4139] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.144 [INFO][4139] ipam_plugin.go 443: Releasing address using workloadID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.149 [INFO][4139] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:42.155113 env[1319]: 2024-02-09 19:05:42.150 [INFO][4125] k8s.go 591: Teardown processing complete. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:42.162177 systemd[1]: run-netns-cni\x2dbadebdce\x2d2189\x2d705f\x2d7939\x2d71819b9abfb3.mount: Deactivated successfully. Feb 9 19:05:42.166115 env[1319]: time="2024-02-09T19:05:42.166056363Z" level=info msg="TearDown network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" successfully" Feb 9 19:05:42.166115 env[1319]: time="2024-02-09T19:05:42.166108863Z" level=info msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" returns successfully" Feb 9 19:05:42.166947 env[1319]: time="2024-02-09T19:05:42.166890967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55bfffb994-jtphf,Uid:8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4,Namespace:calico-system,Attempt:1,}" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.106 [INFO][4132] k8s.go 578: Cleaning up netns ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.106 [INFO][4132] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" iface="eth0" netns="/var/run/netns/cni-1306b876-e424-e4c3-ff10-b555d3763bcf" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.106 [INFO][4132] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" iface="eth0" netns="/var/run/netns/cni-1306b876-e424-e4c3-ff10-b555d3763bcf" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.107 [INFO][4132] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" iface="eth0" netns="/var/run/netns/cni-1306b876-e424-e4c3-ff10-b555d3763bcf" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.107 [INFO][4132] k8s.go 585: Releasing IP address(es) ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.107 [INFO][4132] utils.go 188: Calico CNI releasing IP address ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.151 [INFO][4144] ipam_plugin.go 415: Releasing address using handleID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.151 [INFO][4144] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.151 [INFO][4144] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.163 [WARNING][4144] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.163 [INFO][4144] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.165 [INFO][4144] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:42.168443 env[1319]: 2024-02-09 19:05:42.167 [INFO][4132] k8s.go 591: Teardown processing complete. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:42.169263 env[1319]: time="2024-02-09T19:05:42.169229780Z" level=info msg="TearDown network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" successfully" Feb 9 19:05:42.169374 env[1319]: time="2024-02-09T19:05:42.169355780Z" level=info msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" returns successfully" Feb 9 19:05:42.170385 env[1319]: time="2024-02-09T19:05:42.170352086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-djrwv,Uid:e66e7c92-500b-4b98-8b54-ad6bf0e951c2,Namespace:calico-system,Attempt:1,}" Feb 9 19:05:42.171704 systemd[1]: run-netns-cni\x2d1306b876\x2de424\x2de4c3\x2dff10\x2db555d3763bcf.mount: Deactivated successfully. Feb 9 19:05:42.261066 systemd-networkd[1450]: vxlan.calico: Gained IPv6LL Feb 9 19:05:42.373000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.373000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001834c90 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:42.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:42.374000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.374000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005bdfa0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:42.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:42.404047 systemd-networkd[1450]: caliea53f64e8bd: Link UP Feb 9 19:05:42.409964 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:05:42.417924 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea53f64e8bd: link becomes ready Feb 9 19:05:42.417957 systemd-networkd[1450]: caliea53f64e8bd: Gained carrier Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.297 [INFO][4152] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0 calico-kube-controllers-55bfffb994- calico-system 8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4 799 0 2024-02-09 19:05:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55bfffb994 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f calico-kube-controllers-55bfffb994-jtphf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliea53f64e8bd [] []}} ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.297 [INFO][4152] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.348 [INFO][4178] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" HandleID="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.361 [INFO][4178] ipam_plugin.go 268: Auto assigning IP ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" HandleID="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002905e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"calico-kube-controllers-55bfffb994-jtphf", "timestamp":"2024-02-09 19:05:42.347976332 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.361 [INFO][4178] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.361 [INFO][4178] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.361 [INFO][4178] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.363 [INFO][4178] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.366 [INFO][4178] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.372 [INFO][4178] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.374 [INFO][4178] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.377 [INFO][4178] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.377 [INFO][4178] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.378 [INFO][4178] ipam.go 1682: Creating new handle: k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03 Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.381 [INFO][4178] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.386 [INFO][4178] ipam.go 1216: Successfully claimed IPs: [192.168.64.194/26] block=192.168.64.192/26 handle="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.387 [INFO][4178] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.194/26] handle="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.387 [INFO][4178] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:42.430741 env[1319]: 2024-02-09 19:05:42.387 [INFO][4178] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.194/26] IPv6=[] ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" HandleID="k8s-pod-network.29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.389 [INFO][4152] k8s.go 385: Populated endpoint ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0", GenerateName:"calico-kube-controllers-55bfffb994-", Namespace:"calico-system", SelfLink:"", UID:"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55bfffb994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"calico-kube-controllers-55bfffb994-jtphf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea53f64e8bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.389 [INFO][4152] k8s.go 386: Calico CNI using IPs: [192.168.64.194/32] ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.389 [INFO][4152] dataplane_linux.go 68: Setting the host side veth name to caliea53f64e8bd ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.419 [INFO][4152] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.419 [INFO][4152] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0", GenerateName:"calico-kube-controllers-55bfffb994-", Namespace:"calico-system", SelfLink:"", UID:"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55bfffb994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03", Pod:"calico-kube-controllers-55bfffb994-jtphf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea53f64e8bd", MAC:"a2:b0:ca:8f:b3:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:42.432157 env[1319]: 2024-02-09 19:05:42.429 [INFO][4152] k8s.go 491: Wrote updated endpoint to datastore ContainerID="29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03" Namespace="calico-system" Pod="calico-kube-controllers-55bfffb994-jtphf" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:42.446272 systemd-networkd[1450]: califb42ff361e4: Link UP Feb 9 19:05:42.451881 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb42ff361e4: link becomes ready Feb 9 19:05:42.453117 systemd-networkd[1450]: califb42ff361e4: Gained carrier Feb 9 19:05:42.469974 env[1319]: time="2024-02-09T19:05:42.468395874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:42.469974 env[1319]: time="2024-02-09T19:05:42.468516374Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:42.469974 env[1319]: time="2024-02-09T19:05:42.468549974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:42.469974 env[1319]: time="2024-02-09T19:05:42.468749375Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03 pid=4212 runtime=io.containerd.runc.v2 Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.311 [INFO][4162] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0 csi-node-driver- calico-system e66e7c92-500b-4b98-8b54-ad6bf0e951c2 800 0 2024-02-09 19:05:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f csi-node-driver-djrwv eth0 default [] [] [kns.calico-system ksa.calico-system.default] califb42ff361e4 [] []}} ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.311 [INFO][4162] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.348 [INFO][4183] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" HandleID="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.361 [INFO][4183] ipam_plugin.go 268: Auto assigning IP ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" HandleID="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ac840), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"csi-node-driver-djrwv", "timestamp":"2024-02-09 19:05:42.348942337 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.361 [INFO][4183] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.387 [INFO][4183] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.387 [INFO][4183] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.389 [INFO][4183] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.396 [INFO][4183] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.405 [INFO][4183] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.412 [INFO][4183] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.414 [INFO][4183] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.414 [INFO][4183] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.417 [INFO][4183] ipam.go 1682: Creating new handle: k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8 Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.434 [INFO][4183] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.442 [INFO][4183] ipam.go 1216: Successfully claimed IPs: [192.168.64.195/26] block=192.168.64.192/26 handle="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.442 [INFO][4183] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.195/26] handle="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.442 [INFO][4183] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:42.477476 env[1319]: 2024-02-09 19:05:42.442 [INFO][4183] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.195/26] IPv6=[] ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" HandleID="k8s-pod-network.b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.443 [INFO][4162] k8s.go 385: Populated endpoint ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e66e7c92-500b-4b98-8b54-ad6bf0e951c2", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"csi-node-driver-djrwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califb42ff361e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.443 [INFO][4162] k8s.go 386: Calico CNI using IPs: [192.168.64.195/32] ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.443 [INFO][4162] dataplane_linux.go 68: Setting the host side veth name to califb42ff361e4 ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.455 [INFO][4162] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.455 [INFO][4162] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e66e7c92-500b-4b98-8b54-ad6bf0e951c2", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8", Pod:"csi-node-driver-djrwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califb42ff361e4", MAC:"e2:2d:a6:9d:28:a7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:42.478493 env[1319]: 2024-02-09 19:05:42.473 [INFO][4162] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8" Namespace="calico-system" Pod="csi-node-driver-djrwv" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:42.501213 systemd[1]: Started cri-containerd-29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03.scope. Feb 9 19:05:42.523252 env[1319]: time="2024-02-09T19:05:42.523179665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:42.523465 env[1319]: time="2024-02-09T19:05:42.523255366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:42.523465 env[1319]: time="2024-02-09T19:05:42.523283266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:42.523890 env[1319]: time="2024-02-09T19:05:42.523804269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8 pid=4248 runtime=io.containerd.runc.v2 Feb 9 19:05:42.540996 systemd[1]: Started cri-containerd-b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8.scope. Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.569947 kernel: kauditd_printk_skb: 286 callbacks suppressed Feb 9 19:05:42.570048 kernel: audit: type=1400 audit(1707505542.564:1259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.603993 kernel: audit: type=1400 audit(1707505542.564:1260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.615634 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:05:42.615787 kernel: audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:05:42.615824 kernel: audit: backlog limit exceeded Feb 9 19:05:42.623220 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:05:42.623340 kernel: audit: audit_lost=29 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:05:42.654163 kernel: audit: type=1400 audit(1707505542.564:1261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654400 kernel: audit: backlog limit exceeded Feb 9 19:05:42.654453 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.564000 audit: BPF prog-id=170 op=LOAD Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4212 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239646632356132386163316463333636626263666337643638353562 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4212 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239646632356132386163316463333636626263666337643638353562 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit: BPF prog-id=171 op=LOAD Feb 9 19:05:42.586000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003de990 items=0 ppid=4212 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239646632356132386163316463333636626263666337643638353562 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.586000 audit: BPF prog-id=172 op=LOAD Feb 9 19:05:42.586000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003de9d8 items=0 ppid=4212 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239646632356132386163316463333636626263666337643638353562 Feb 9 19:05:42.587000 audit: BPF prog-id=172 op=UNLOAD Feb 9 19:05:42.587000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.587000 audit: BPF prog-id=173 op=LOAD Feb 9 19:05:42.587000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003dede8 items=0 ppid=4212 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239646632356132386163316463333636626263666337643638353562 Feb 9 19:05:42.598000 audit[4281]: NETFILTER_CFG table=filter:116 family=2 entries=66 op=nft_register_chain pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:42.598000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=36484 a0=3 a1=7ffc97c928e0 a2=0 a3=7ffc97c928cc items=0 ppid=3778 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.598000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:42.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.644000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.644000 audit[4263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024390 items=0 ppid=4248 pid=4263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316265313939396634613261626166663737313765393564646264 Feb 9 19:05:42.653000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.653000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.653000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.653000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.653000 audit[4263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000243d8 items=0 ppid=4248 pid=4263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316265313939396634613261626166663737313765393564646264 Feb 9 19:05:42.653000 audit: BPF prog-id=176 op=UNLOAD Feb 9 19:05:42.654000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { perfmon } for pid=4263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit[4263]: AVC avc: denied { bpf } for pid=4263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:42.654000 audit: BPF prog-id=177 op=LOAD Feb 9 19:05:42.654000 audit[4263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000247e8 items=0 ppid=4248 pid=4263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:42.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316265313939396634613261626166663737313765393564646264 Feb 9 19:05:42.678737 env[1319]: time="2024-02-09T19:05:42.678430393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-djrwv,Uid:e66e7c92-500b-4b98-8b54-ad6bf0e951c2,Namespace:calico-system,Attempt:1,} returns sandbox id \"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8\"" Feb 9 19:05:42.686397 env[1319]: time="2024-02-09T19:05:42.686349535Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:05:42.726034 env[1319]: time="2024-02-09T19:05:42.725973146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55bfffb994-jtphf,Uid:8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4,Namespace:calico-system,Attempt:1,} returns sandbox id \"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03\"" Feb 9 19:05:42.802000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.802000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008e36c80 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:42.802000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.802000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008373680 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:42.804000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.804000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00800b4a0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:42.814000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.814000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008e36cc0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:42.814000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.814000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00800b9b0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:42.816000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:42.816000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008373740 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:05:42.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:05:43.009535 env[1319]: time="2024-02-09T19:05:43.009395356Z" level=info msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] k8s.go 578: Cleaning up netns ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" iface="eth0" netns="/var/run/netns/cni-acef060d-f930-1a31-4112-ec468178f691" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" iface="eth0" netns="/var/run/netns/cni-acef060d-f930-1a31-4112-ec468178f691" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" iface="eth0" netns="/var/run/netns/cni-acef060d-f930-1a31-4112-ec468178f691" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] k8s.go 585: Releasing IP address(es) ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.055 [INFO][4316] utils.go 188: Calico CNI releasing IP address ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.084 [INFO][4322] ipam_plugin.go 415: Releasing address using handleID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.084 [INFO][4322] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.084 [INFO][4322] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.090 [WARNING][4322] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.090 [INFO][4322] ipam_plugin.go 443: Releasing address using workloadID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.091 [INFO][4322] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:43.093743 env[1319]: 2024-02-09 19:05:43.092 [INFO][4316] k8s.go 591: Teardown processing complete. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:43.094455 env[1319]: time="2024-02-09T19:05:43.093994201Z" level=info msg="TearDown network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" successfully" Feb 9 19:05:43.094455 env[1319]: time="2024-02-09T19:05:43.094049902Z" level=info msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" returns successfully" Feb 9 19:05:43.095006 env[1319]: time="2024-02-09T19:05:43.094953807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zgddb,Uid:31883a80-bb4b-47b6-a395-71ebea529eef,Namespace:kube-system,Attempt:1,}" Feb 9 19:05:43.165758 systemd[1]: run-netns-cni\x2dacef060d\x2df930\x2d1a31\x2d4112\x2dec468178f691.mount: Deactivated successfully. Feb 9 19:05:43.238762 systemd-networkd[1450]: caliac1a94d6fd6: Link UP Feb 9 19:05:43.247988 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac1a94d6fd6: link becomes ready Feb 9 19:05:43.247702 systemd-networkd[1450]: caliac1a94d6fd6: Gained carrier Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.164 [INFO][4329] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0 coredns-5dd5756b68- kube-system 31883a80-bb4b-47b6-a395-71ebea529eef 812 0 2024-02-09 19:05:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f coredns-5dd5756b68-zgddb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliac1a94d6fd6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.165 [INFO][4329] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.193 [INFO][4339] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" HandleID="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.201 [INFO][4339] ipam_plugin.go 268: Auto assigning IP ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" HandleID="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"coredns-5dd5756b68-zgddb", "timestamp":"2024-02-09 19:05:43.193092124 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.201 [INFO][4339] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.201 [INFO][4339] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.201 [INFO][4339] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.203 [INFO][4339] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.206 [INFO][4339] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.214 [INFO][4339] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.216 [INFO][4339] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.218 [INFO][4339] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.218 [INFO][4339] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.219 [INFO][4339] ipam.go 1682: Creating new handle: k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.227 [INFO][4339] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.232 [INFO][4339] ipam.go 1216: Successfully claimed IPs: [192.168.64.196/26] block=192.168.64.192/26 handle="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.233 [INFO][4339] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.196/26] handle="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.233 [INFO][4339] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:43.268849 env[1319]: 2024-02-09 19:05:43.233 [INFO][4339] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.196/26] IPv6=[] ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" HandleID="k8s-pod-network.f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.234 [INFO][4329] k8s.go 385: Populated endpoint ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"31883a80-bb4b-47b6-a395-71ebea529eef", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"coredns-5dd5756b68-zgddb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliac1a94d6fd6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.235 [INFO][4329] k8s.go 386: Calico CNI using IPs: [192.168.64.196/32] ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.235 [INFO][4329] dataplane_linux.go 68: Setting the host side veth name to caliac1a94d6fd6 ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.239 [INFO][4329] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.239 [INFO][4329] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"31883a80-bb4b-47b6-a395-71ebea529eef", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e", Pod:"coredns-5dd5756b68-zgddb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliac1a94d6fd6", MAC:"0a:29:60:6e:64:24", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:43.269690 env[1319]: 2024-02-09 19:05:43.266 [INFO][4329] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e" Namespace="kube-system" Pod="coredns-5dd5756b68-zgddb" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:43.293000 audit[4359]: NETFILTER_CFG table=filter:117 family=2 entries=38 op=nft_register_chain pid=4359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:43.293000 audit[4359]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffea0f81a30 a2=0 a3=7ffea0f81a1c items=0 ppid=3778 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.293000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:43.297212 env[1319]: time="2024-02-09T19:05:43.297139072Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:43.297441 env[1319]: time="2024-02-09T19:05:43.297405774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:43.297580 env[1319]: time="2024-02-09T19:05:43.297553474Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:43.297970 env[1319]: time="2024-02-09T19:05:43.297839376Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e pid=4367 runtime=io.containerd.runc.v2 Feb 9 19:05:43.328234 systemd[1]: Started cri-containerd-f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e.scope. Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.339000 audit: BPF prog-id=178 op=LOAD Feb 9 19:05:43.340000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.340000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4367 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632306632636532663039366335343238373033646266646666653366 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4367 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632306632636532663039366335343238373033646266646666653366 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit: BPF prog-id=179 op=LOAD Feb 9 19:05:43.341000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a2510 items=0 ppid=4367 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632306632636532663039366335343238373033646266646666653366 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.341000 audit: BPF prog-id=180 op=LOAD Feb 9 19:05:43.341000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a2558 items=0 ppid=4367 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632306632636532663039366335343238373033646266646666653366 Feb 9 19:05:43.342000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:05:43.342000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.342000 audit: BPF prog-id=181 op=LOAD Feb 9 19:05:43.342000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a2968 items=0 ppid=4367 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632306632636532663039366335343238373033646266646666653366 Feb 9 19:05:43.374620 env[1319]: time="2024-02-09T19:05:43.374567380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-zgddb,Uid:31883a80-bb4b-47b6-a395-71ebea529eef,Namespace:kube-system,Attempt:1,} returns sandbox id \"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e\"" Feb 9 19:05:43.378143 env[1319]: time="2024-02-09T19:05:43.378097799Z" level=info msg="CreateContainer within sandbox \"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:05:43.420062 env[1319]: time="2024-02-09T19:05:43.420003420Z" level=info msg="CreateContainer within sandbox \"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f5a94d7bbf11dd0ed6b678910216995ff182508fde2667783a32dc8bcea91a37\"" Feb 9 19:05:43.422448 env[1319]: time="2024-02-09T19:05:43.422406133Z" level=info msg="StartContainer for \"f5a94d7bbf11dd0ed6b678910216995ff182508fde2667783a32dc8bcea91a37\"" Feb 9 19:05:43.444176 systemd[1]: Started cri-containerd-f5a94d7bbf11dd0ed6b678910216995ff182508fde2667783a32dc8bcea91a37.scope. Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.462000 audit: BPF prog-id=182 op=LOAD Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4367 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613934643762626631316464306564366236373839313032313639 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4367 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613934643762626631316464306564366236373839313032313639 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit: BPF prog-id=183 op=LOAD Feb 9 19:05:43.463000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003ac0a0 items=0 ppid=4367 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613934643762626631316464306564366236373839313032313639 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit: BPF prog-id=184 op=LOAD Feb 9 19:05:43.463000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003ac0e8 items=0 ppid=4367 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613934643762626631316464306564366236373839313032313639 Feb 9 19:05:43.463000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:05:43.463000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:43.463000 audit: BPF prog-id=185 op=LOAD Feb 9 19:05:43.463000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ac4f8 items=0 ppid=4367 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:43.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613934643762626631316464306564366236373839313032313639 Feb 9 19:05:43.487122 env[1319]: time="2024-02-09T19:05:43.487067573Z" level=info msg="StartContainer for \"f5a94d7bbf11dd0ed6b678910216995ff182508fde2667783a32dc8bcea91a37\" returns successfully" Feb 9 19:05:43.924150 systemd-networkd[1450]: caliea53f64e8bd: Gained IPv6LL Feb 9 19:05:44.240416 kubelet[2464]: I0209 19:05:44.240302 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-zgddb" podStartSLOduration=43.24025673 podCreationTimestamp="2024-02-09 19:05:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:05:44.239350926 +0000 UTC m=+57.423515879" watchObservedRunningTime="2024-02-09 19:05:44.24025673 +0000 UTC m=+57.424421583" Feb 9 19:05:44.275000 audit[4439]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:44.275000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc5c0947c0 a2=0 a3=7ffc5c0947ac items=0 ppid=2638 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:44.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:44.277000 audit[4439]: NETFILTER_CFG table=nat:119 family=2 entries=44 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:44.277000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc5c0947c0 a2=0 a3=7ffc5c0947ac items=0 ppid=2638 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:44.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:44.288000 audit[4441]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:44.288000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff9731f990 a2=0 a3=7fff9731f97c items=0 ppid=2638 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:44.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:44.296000 audit[4441]: NETFILTER_CFG table=nat:121 family=2 entries=56 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:44.296000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff9731f990 a2=0 a3=7fff9731f97c items=0 ppid=2638 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:44.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:44.372132 systemd-networkd[1450]: califb42ff361e4: Gained IPv6LL Feb 9 19:05:44.549820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1214427499.mount: Deactivated successfully. Feb 9 19:05:45.140123 systemd-networkd[1450]: caliac1a94d6fd6: Gained IPv6LL Feb 9 19:05:45.400415 env[1319]: time="2024-02-09T19:05:45.400271259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:45.406319 env[1319]: time="2024-02-09T19:05:45.406272890Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:45.408964 env[1319]: time="2024-02-09T19:05:45.408925404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:45.412352 env[1319]: time="2024-02-09T19:05:45.412312221Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:45.412988 env[1319]: time="2024-02-09T19:05:45.412952625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:05:45.413771 env[1319]: time="2024-02-09T19:05:45.413741829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:05:45.416387 env[1319]: time="2024-02-09T19:05:45.416210841Z" level=info msg="CreateContainer within sandbox \"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:05:45.445970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1616007594.mount: Deactivated successfully. Feb 9 19:05:45.456939 env[1319]: time="2024-02-09T19:05:45.456887451Z" level=info msg="CreateContainer within sandbox \"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"156657a83a9fe896b734d3cc46f6018dcafa9c6daa31f5c97a681ee56dc85023\"" Feb 9 19:05:45.459001 env[1319]: time="2024-02-09T19:05:45.457555055Z" level=info msg="StartContainer for \"156657a83a9fe896b734d3cc46f6018dcafa9c6daa31f5c97a681ee56dc85023\"" Feb 9 19:05:45.493393 systemd[1]: run-containerd-runc-k8s.io-156657a83a9fe896b734d3cc46f6018dcafa9c6daa31f5c97a681ee56dc85023-runc.HULsy3.mount: Deactivated successfully. Feb 9 19:05:45.499117 systemd[1]: Started cri-containerd-156657a83a9fe896b734d3cc46f6018dcafa9c6daa31f5c97a681ee56dc85023.scope. Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4248 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:45.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363635376138336139666538393662373334643363633436663630 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.519000 audit: BPF prog-id=186 op=LOAD Feb 9 19:05:45.519000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000320d50 items=0 ppid=4248 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:45.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363635376138336139666538393662373334643363633436663630 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.520000 audit: BPF prog-id=187 op=LOAD Feb 9 19:05:45.520000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000320d98 items=0 ppid=4248 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:45.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363635376138336139666538393662373334643363633436663630 Feb 9 19:05:45.521000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:05:45.521000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:45.521000 audit: BPF prog-id=188 op=LOAD Feb 9 19:05:45.521000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000320e28 items=0 ppid=4248 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:45.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363635376138336139666538393662373334643363633436663630 Feb 9 19:05:45.543457 env[1319]: time="2024-02-09T19:05:45.543403098Z" level=info msg="StartContainer for \"156657a83a9fe896b734d3cc46f6018dcafa9c6daa31f5c97a681ee56dc85023\" returns successfully" Feb 9 19:05:46.967321 env[1319]: time="2024-02-09T19:05:46.967275898Z" level=info msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.001 [WARNING][4494] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0", GenerateName:"calico-kube-controllers-55bfffb994-", Namespace:"calico-system", SelfLink:"", UID:"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55bfffb994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03", Pod:"calico-kube-controllers-55bfffb994-jtphf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea53f64e8bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.001 [INFO][4494] k8s.go 578: Cleaning up netns ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.001 [INFO][4494] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" iface="eth0" netns="" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.001 [INFO][4494] k8s.go 585: Releasing IP address(es) ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.001 [INFO][4494] utils.go 188: Calico CNI releasing IP address ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.028 [INFO][4501] ipam_plugin.go 415: Releasing address using handleID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.028 [INFO][4501] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.028 [INFO][4501] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.035 [WARNING][4501] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.035 [INFO][4501] ipam_plugin.go 443: Releasing address using workloadID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.036 [INFO][4501] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.038994 env[1319]: 2024-02-09 19:05:47.037 [INFO][4494] k8s.go 591: Teardown processing complete. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.039682 env[1319]: time="2024-02-09T19:05:47.039019363Z" level=info msg="TearDown network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" successfully" Feb 9 19:05:47.039682 env[1319]: time="2024-02-09T19:05:47.039058063Z" level=info msg="StopPodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" returns successfully" Feb 9 19:05:47.039768 env[1319]: time="2024-02-09T19:05:47.039738667Z" level=info msg="RemovePodSandbox for \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" Feb 9 19:05:47.039826 env[1319]: time="2024-02-09T19:05:47.039776967Z" level=info msg="Forcibly stopping sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\"" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.076 [WARNING][4523] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0", GenerateName:"calico-kube-controllers-55bfffb994-", Namespace:"calico-system", SelfLink:"", UID:"8e8b3ddf-9ff2-41d1-9b8b-69101d80f6b4", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55bfffb994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03", Pod:"calico-kube-controllers-55bfffb994-jtphf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea53f64e8bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.076 [INFO][4523] k8s.go 578: Cleaning up netns ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.076 [INFO][4523] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" iface="eth0" netns="" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.076 [INFO][4523] k8s.go 585: Releasing IP address(es) ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.076 [INFO][4523] utils.go 188: Calico CNI releasing IP address ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.098 [INFO][4529] ipam_plugin.go 415: Releasing address using handleID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.098 [INFO][4529] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.098 [INFO][4529] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.104 [WARNING][4529] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.104 [INFO][4529] ipam_plugin.go 443: Releasing address using workloadID ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" HandleID="k8s-pod-network.592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--kube--controllers--55bfffb994--jtphf-eth0" Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.106 [INFO][4529] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.108789 env[1319]: 2024-02-09 19:05:47.107 [INFO][4523] k8s.go 591: Teardown processing complete. ContainerID="592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69" Feb 9 19:05:47.109552 env[1319]: time="2024-02-09T19:05:47.108831216Z" level=info msg="TearDown network for sandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" successfully" Feb 9 19:05:47.118880 env[1319]: time="2024-02-09T19:05:47.118818567Z" level=info msg="RemovePodSandbox \"592356e2bbc0a89ba69a8084aa4313d0d631389737349dbe1fb098141d5d8c69\" returns successfully" Feb 9 19:05:47.119732 env[1319]: time="2024-02-09T19:05:47.119696571Z" level=info msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.155 [WARNING][4548] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"635faf4e-87e9-4ce6-b747-05caf0570c82", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11", Pod:"coredns-5dd5756b68-nqqx4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidce0ee29d19", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.155 [INFO][4548] k8s.go 578: Cleaning up netns ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.155 [INFO][4548] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" iface="eth0" netns="" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.156 [INFO][4548] k8s.go 585: Releasing IP address(es) ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.156 [INFO][4548] utils.go 188: Calico CNI releasing IP address ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.184 [INFO][4554] ipam_plugin.go 415: Releasing address using handleID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.184 [INFO][4554] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.184 [INFO][4554] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.191 [WARNING][4554] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.191 [INFO][4554] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.193 [INFO][4554] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.195385 env[1319]: 2024-02-09 19:05:47.194 [INFO][4548] k8s.go 591: Teardown processing complete. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.196114 env[1319]: time="2024-02-09T19:05:47.195449655Z" level=info msg="TearDown network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" successfully" Feb 9 19:05:47.196114 env[1319]: time="2024-02-09T19:05:47.195497455Z" level=info msg="StopPodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" returns successfully" Feb 9 19:05:47.196198 env[1319]: time="2024-02-09T19:05:47.196147758Z" level=info msg="RemovePodSandbox for \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" Feb 9 19:05:47.196238 env[1319]: time="2024-02-09T19:05:47.196193158Z" level=info msg="Forcibly stopping sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\"" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.228 [WARNING][4572] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"635faf4e-87e9-4ce6-b747-05caf0570c82", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b70a66039ae1aaa7b8b934474c76d75c06f3a4503be5b0949995b2593a15fb11", Pod:"coredns-5dd5756b68-nqqx4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidce0ee29d19", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.228 [INFO][4572] k8s.go 578: Cleaning up netns ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.228 [INFO][4572] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" iface="eth0" netns="" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.229 [INFO][4572] k8s.go 585: Releasing IP address(es) ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.229 [INFO][4572] utils.go 188: Calico CNI releasing IP address ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.253 [INFO][4578] ipam_plugin.go 415: Releasing address using handleID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.253 [INFO][4578] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.253 [INFO][4578] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.259 [WARNING][4578] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.259 [INFO][4578] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" HandleID="k8s-pod-network.9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--nqqx4-eth0" Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.260 [INFO][4578] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.262733 env[1319]: 2024-02-09 19:05:47.261 [INFO][4572] k8s.go 591: Teardown processing complete. ContainerID="9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce" Feb 9 19:05:47.263626 env[1319]: time="2024-02-09T19:05:47.263577199Z" level=info msg="TearDown network for sandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" successfully" Feb 9 19:05:47.274999 env[1319]: time="2024-02-09T19:05:47.274953057Z" level=info msg="RemovePodSandbox \"9176b1270cc03c1bb19d675403fd256a0fe1020b9dbe9f4a5f0d56e398d12fce\" returns successfully" Feb 9 19:05:47.275751 env[1319]: time="2024-02-09T19:05:47.275715361Z" level=info msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.309 [WARNING][4597] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"31883a80-bb4b-47b6-a395-71ebea529eef", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e", Pod:"coredns-5dd5756b68-zgddb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliac1a94d6fd6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.310 [INFO][4597] k8s.go 578: Cleaning up netns ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.310 [INFO][4597] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" iface="eth0" netns="" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.310 [INFO][4597] k8s.go 585: Releasing IP address(es) ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.310 [INFO][4597] utils.go 188: Calico CNI releasing IP address ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.331 [INFO][4603] ipam_plugin.go 415: Releasing address using handleID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.331 [INFO][4603] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.331 [INFO][4603] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.337 [WARNING][4603] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.337 [INFO][4603] ipam_plugin.go 443: Releasing address using workloadID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.339 [INFO][4603] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.341208 env[1319]: 2024-02-09 19:05:47.340 [INFO][4597] k8s.go 591: Teardown processing complete. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.341959 env[1319]: time="2024-02-09T19:05:47.341879395Z" level=info msg="TearDown network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" successfully" Feb 9 19:05:47.341959 env[1319]: time="2024-02-09T19:05:47.341954696Z" level=info msg="StopPodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" returns successfully" Feb 9 19:05:47.342580 env[1319]: time="2024-02-09T19:05:47.342545999Z" level=info msg="RemovePodSandbox for \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" Feb 9 19:05:47.342737 env[1319]: time="2024-02-09T19:05:47.342584899Z" level=info msg="Forcibly stopping sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\"" Feb 9 19:05:47.396134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2133359057.mount: Deactivated successfully. Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.380 [WARNING][4623] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"31883a80-bb4b-47b6-a395-71ebea529eef", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"f20f2ce2f096c5428703dbfdffe3f9196379287e81ffbfb72758cfeefd54bf0e", Pod:"coredns-5dd5756b68-zgddb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliac1a94d6fd6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.380 [INFO][4623] k8s.go 578: Cleaning up netns ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.380 [INFO][4623] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" iface="eth0" netns="" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.380 [INFO][4623] k8s.go 585: Releasing IP address(es) ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.381 [INFO][4623] utils.go 188: Calico CNI releasing IP address ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.416 [INFO][4629] ipam_plugin.go 415: Releasing address using handleID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.417 [INFO][4629] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.417 [INFO][4629] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.423 [WARNING][4629] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.424 [INFO][4629] ipam_plugin.go 443: Releasing address using workloadID ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" HandleID="k8s-pod-network.673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-coredns--5dd5756b68--zgddb-eth0" Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.426 [INFO][4629] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.428356 env[1319]: 2024-02-09 19:05:47.427 [INFO][4623] k8s.go 591: Teardown processing complete. ContainerID="673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4" Feb 9 19:05:47.429101 env[1319]: time="2024-02-09T19:05:47.428400833Z" level=info msg="TearDown network for sandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" successfully" Feb 9 19:05:47.437117 env[1319]: time="2024-02-09T19:05:47.437051077Z" level=info msg="RemovePodSandbox \"673bd10e0b859f119c7887c53060f2a6b9a83df40cf550436015093a791d89e4\" returns successfully" Feb 9 19:05:47.437798 env[1319]: time="2024-02-09T19:05:47.437760481Z" level=info msg="StopPodSandbox for \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\"" Feb 9 19:05:47.437967 env[1319]: time="2024-02-09T19:05:47.437888781Z" level=info msg="TearDown network for sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" successfully" Feb 9 19:05:47.437967 env[1319]: time="2024-02-09T19:05:47.437939782Z" level=info msg="StopPodSandbox for \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" returns successfully" Feb 9 19:05:47.438364 env[1319]: time="2024-02-09T19:05:47.438313783Z" level=info msg="RemovePodSandbox for \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\"" Feb 9 19:05:47.438478 env[1319]: time="2024-02-09T19:05:47.438348984Z" level=info msg="Forcibly stopping sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\"" Feb 9 19:05:47.438478 env[1319]: time="2024-02-09T19:05:47.438446984Z" level=info msg="TearDown network for sandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" successfully" Feb 9 19:05:47.457832 env[1319]: time="2024-02-09T19:05:47.457776082Z" level=info msg="RemovePodSandbox \"6391a0d86310f5a5ce2aec93f1264538568f181857c8c8078f0d30e711af5a1a\" returns successfully" Feb 9 19:05:47.458394 env[1319]: time="2024-02-09T19:05:47.458359785Z" level=info msg="StopPodSandbox for \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\"" Feb 9 19:05:47.458520 env[1319]: time="2024-02-09T19:05:47.458470985Z" level=info msg="TearDown network for sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" successfully" Feb 9 19:05:47.458520 env[1319]: time="2024-02-09T19:05:47.458512486Z" level=info msg="StopPodSandbox for \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" returns successfully" Feb 9 19:05:47.458934 env[1319]: time="2024-02-09T19:05:47.458900188Z" level=info msg="RemovePodSandbox for \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\"" Feb 9 19:05:47.459045 env[1319]: time="2024-02-09T19:05:47.458937688Z" level=info msg="Forcibly stopping sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\"" Feb 9 19:05:47.459045 env[1319]: time="2024-02-09T19:05:47.459017888Z" level=info msg="TearDown network for sandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" successfully" Feb 9 19:05:47.469635 env[1319]: time="2024-02-09T19:05:47.469585742Z" level=info msg="RemovePodSandbox \"961753540001c79ffa433102c5837f8264f9c7429709699c6f42a07d4472b4f1\" returns successfully" Feb 9 19:05:47.470337 env[1319]: time="2024-02-09T19:05:47.470305045Z" level=info msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.522 [WARNING][4648] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e66e7c92-500b-4b98-8b54-ad6bf0e951c2", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8", Pod:"csi-node-driver-djrwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califb42ff361e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.522 [INFO][4648] k8s.go 578: Cleaning up netns ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.522 [INFO][4648] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" iface="eth0" netns="" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.522 [INFO][4648] k8s.go 585: Releasing IP address(es) ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.523 [INFO][4648] utils.go 188: Calico CNI releasing IP address ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.548 [INFO][4654] ipam_plugin.go 415: Releasing address using handleID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.548 [INFO][4654] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.548 [INFO][4654] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.554 [WARNING][4654] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.554 [INFO][4654] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.555 [INFO][4654] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.561478 env[1319]: 2024-02-09 19:05:47.557 [INFO][4648] k8s.go 591: Teardown processing complete. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.561478 env[1319]: time="2024-02-09T19:05:47.558934594Z" level=info msg="TearDown network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" successfully" Feb 9 19:05:47.561478 env[1319]: time="2024-02-09T19:05:47.558982394Z" level=info msg="StopPodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" returns successfully" Feb 9 19:05:47.561478 env[1319]: time="2024-02-09T19:05:47.559637697Z" level=info msg="RemovePodSandbox for \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" Feb 9 19:05:47.561478 env[1319]: time="2024-02-09T19:05:47.559675097Z" level=info msg="Forcibly stopping sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\"" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.601 [WARNING][4674] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e66e7c92-500b-4b98-8b54-ad6bf0e951c2", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8", Pod:"csi-node-driver-djrwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califb42ff361e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.602 [INFO][4674] k8s.go 578: Cleaning up netns ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.602 [INFO][4674] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" iface="eth0" netns="" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.602 [INFO][4674] k8s.go 585: Releasing IP address(es) ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.602 [INFO][4674] utils.go 188: Calico CNI releasing IP address ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.624 [INFO][4680] ipam_plugin.go 415: Releasing address using handleID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.624 [INFO][4680] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.624 [INFO][4680] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.631 [WARNING][4680] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.631 [INFO][4680] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" HandleID="k8s-pod-network.de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-csi--node--driver--djrwv-eth0" Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.632 [INFO][4680] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:47.634434 env[1319]: 2024-02-09 19:05:47.633 [INFO][4674] k8s.go 591: Teardown processing complete. ContainerID="de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c" Feb 9 19:05:47.635152 env[1319]: time="2024-02-09T19:05:47.634463576Z" level=info msg="TearDown network for sandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" successfully" Feb 9 19:05:47.645930 env[1319]: time="2024-02-09T19:05:47.645877034Z" level=info msg="RemovePodSandbox \"de0effad232bfee799dbacf24e94f6e4f0f8311c3120aa4b343e664e23aaa07c\" returns successfully" Feb 9 19:05:49.210910 env[1319]: time="2024-02-09T19:05:49.210859684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:49.216607 env[1319]: time="2024-02-09T19:05:49.216561312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:49.219883 env[1319]: time="2024-02-09T19:05:49.219819028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:49.223431 env[1319]: time="2024-02-09T19:05:49.223388846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:49.224198 env[1319]: time="2024-02-09T19:05:49.224162950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:05:49.229975 env[1319]: time="2024-02-09T19:05:49.229931778Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:05:49.244710 env[1319]: time="2024-02-09T19:05:49.244663152Z" level=info msg="CreateContainer within sandbox \"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:05:49.281798 env[1319]: time="2024-02-09T19:05:49.281743336Z" level=info msg="CreateContainer within sandbox \"29df25a28ac1dc366bbcfc7d6855bfd7af969b0cdd519a47a9351e904f8bfa03\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596\"" Feb 9 19:05:49.282467 env[1319]: time="2024-02-09T19:05:49.282430139Z" level=info msg="StartContainer for \"7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596\"" Feb 9 19:05:49.314472 systemd[1]: Started cri-containerd-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596.scope. Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.339162 kernel: kauditd_printk_skb: 347 callbacks suppressed Feb 9 19:05:49.339290 kernel: audit: type=1400 audit(1707505549.330:1338): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.366472 kernel: audit: type=1400 audit(1707505549.330:1339): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.380624 kernel: audit: type=1400 audit(1707505549.330:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.396365 kernel: audit: type=1400 audit(1707505549.330:1341): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.422803 kernel: audit: type=1400 audit(1707505549.330:1342): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.422984 kernel: audit: type=1400 audit(1707505549.330:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.423030 kernel: audit: type=1400 audit(1707505549.330:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.452477 kernel: audit: type=1400 audit(1707505549.330:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.471701 kernel: audit: type=1400 audit(1707505549.330:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit: BPF prog-id=189 op=LOAD Feb 9 19:05:49.486960 kernel: audit: type=1400 audit(1707505549.330:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4212 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:49.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373661633435336439353832623237643465396331343165393338 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4212 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:49.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373661633435336439353832623237643465396331343165393338 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.330000 audit: BPF prog-id=190 op=LOAD Feb 9 19:05:49.330000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001fa810 items=0 ppid=4212 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:49.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373661633435336439353832623237643465396331343165393338 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.365000 audit: BPF prog-id=191 op=LOAD Feb 9 19:05:49.365000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001fa858 items=0 ppid=4212 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:49.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373661633435336439353832623237643465396331343165393338 Feb 9 19:05:49.379000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:05:49.379000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:49.379000 audit: BPF prog-id=192 op=LOAD Feb 9 19:05:49.379000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001fac68 items=0 ppid=4212 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:49.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762373661633435336439353832623237643465396331343165393338 Feb 9 19:05:49.496440 env[1319]: time="2024-02-09T19:05:49.496376501Z" level=info msg="StartContainer for \"7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596\" returns successfully" Feb 9 19:05:50.233138 systemd[1]: run-containerd-runc-k8s.io-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596-runc.BidZfw.mount: Deactivated successfully. Feb 9 19:05:50.328454 kubelet[2464]: I0209 19:05:50.327873 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55bfffb994-jtphf" podStartSLOduration=36.832203124 podCreationTimestamp="2024-02-09 19:05:07 +0000 UTC" firstStartedPulling="2024-02-09 19:05:42.729012462 +0000 UTC m=+55.913177315" lastFinishedPulling="2024-02-09 19:05:49.224620252 +0000 UTC m=+62.408785205" observedRunningTime="2024-02-09 19:05:50.325573103 +0000 UTC m=+63.509737956" watchObservedRunningTime="2024-02-09 19:05:50.327811014 +0000 UTC m=+63.511975867" Feb 9 19:05:50.351937 systemd[1]: run-containerd-runc-k8s.io-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596-runc.PRifl9.mount: Deactivated successfully. Feb 9 19:05:51.231947 systemd[1]: run-containerd-runc-k8s.io-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8-runc.X7j09y.mount: Deactivated successfully. Feb 9 19:05:51.463830 env[1319]: time="2024-02-09T19:05:51.463768080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:51.471191 env[1319]: time="2024-02-09T19:05:51.471128916Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:51.475814 env[1319]: time="2024-02-09T19:05:51.475758439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:51.479950 env[1319]: time="2024-02-09T19:05:51.479898259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:05:51.480867 env[1319]: time="2024-02-09T19:05:51.480806363Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:05:51.483937 env[1319]: time="2024-02-09T19:05:51.483892278Z" level=info msg="CreateContainer within sandbox \"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:05:51.523163 env[1319]: time="2024-02-09T19:05:51.523049169Z" level=info msg="CreateContainer within sandbox \"b51be1999f4a2abaff7717e95ddbd74ce6ef1639137d0abae3210690a0e1a7b8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6cd104bd9527963c4e1015f6983adfbcb40af6965eec101232bf7c1b69a425af\"" Feb 9 19:05:51.524194 env[1319]: time="2024-02-09T19:05:51.524157175Z" level=info msg="StartContainer for \"6cd104bd9527963c4e1015f6983adfbcb40af6965eec101232bf7c1b69a425af\"" Feb 9 19:05:51.549638 systemd[1]: Started cri-containerd-6cd104bd9527963c4e1015f6983adfbcb40af6965eec101232bf7c1b69a425af.scope. Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4248 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:51.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663643130346264393532373936336334653130313566363938336164 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit: BPF prog-id=193 op=LOAD Feb 9 19:05:51.573000 audit[4783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000320a80 items=0 ppid=4248 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:51.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663643130346264393532373936336334653130313566363938336164 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit: BPF prog-id=194 op=LOAD Feb 9 19:05:51.573000 audit[4783]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000320ac8 items=0 ppid=4248 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:51.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663643130346264393532373936336334653130313566363938336164 Feb 9 19:05:51.573000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:05:51.573000 audit: BPF prog-id=193 op=UNLOAD Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { perfmon } for pid=4783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit[4783]: AVC avc: denied { bpf } for pid=4783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:51.573000 audit: BPF prog-id=195 op=LOAD Feb 9 19:05:51.573000 audit[4783]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000320b58 items=0 ppid=4248 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:51.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663643130346264393532373936336334653130313566363938336164 Feb 9 19:05:51.596676 env[1319]: time="2024-02-09T19:05:51.596581528Z" level=info msg="StartContainer for \"6cd104bd9527963c4e1015f6983adfbcb40af6965eec101232bf7c1b69a425af\" returns successfully" Feb 9 19:05:52.179128 kubelet[2464]: I0209 19:05:52.179090 2464 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:05:52.179128 kubelet[2464]: I0209 19:05:52.179136 2464 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:05:52.323748 kubelet[2464]: I0209 19:05:52.323700 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-djrwv" podStartSLOduration=37.528244524 podCreationTimestamp="2024-02-09 19:05:06 +0000 UTC" firstStartedPulling="2024-02-09 19:05:42.685881632 +0000 UTC m=+55.870046485" lastFinishedPulling="2024-02-09 19:05:51.481284366 +0000 UTC m=+64.665449319" observedRunningTime="2024-02-09 19:05:52.322795854 +0000 UTC m=+65.506960707" watchObservedRunningTime="2024-02-09 19:05:52.323647358 +0000 UTC m=+65.507812211" Feb 9 19:05:56.437151 kubelet[2464]: I0209 19:05:56.437103 2464 topology_manager.go:215] "Topology Admit Handler" podUID="3bc6cec6-bb3d-4506-85a2-37e118103804" podNamespace="calico-apiserver" podName="calico-apiserver-58c79c7d95-c4dc6" Feb 9 19:05:56.443995 systemd[1]: Created slice kubepods-besteffort-pod3bc6cec6_bb3d_4506_85a2_37e118103804.slice. Feb 9 19:05:56.457508 kubelet[2464]: I0209 19:05:56.457466 2464 topology_manager.go:215] "Topology Admit Handler" podUID="8f8a2ca8-a214-43bd-aefe-967aec7d78ed" podNamespace="calico-apiserver" podName="calico-apiserver-58c79c7d95-pz62v" Feb 9 19:05:56.464149 systemd[1]: Created slice kubepods-besteffort-pod8f8a2ca8_a214_43bd_aefe_967aec7d78ed.slice. Feb 9 19:05:56.515902 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 19:05:56.516073 kernel: audit: type=1325 audit(1707505556.507:1362): table=filter:122 family=2 entries=8 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.507000 audit[4818]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.524186 kubelet[2464]: I0209 19:05:56.524142 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8f8a2ca8-a214-43bd-aefe-967aec7d78ed-calico-apiserver-certs\") pod \"calico-apiserver-58c79c7d95-pz62v\" (UID: \"8f8a2ca8-a214-43bd-aefe-967aec7d78ed\") " pod="calico-apiserver/calico-apiserver-58c79c7d95-pz62v" Feb 9 19:05:56.524499 kubelet[2464]: I0209 19:05:56.524482 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxbcs\" (UniqueName: \"kubernetes.io/projected/3bc6cec6-bb3d-4506-85a2-37e118103804-kube-api-access-nxbcs\") pod \"calico-apiserver-58c79c7d95-c4dc6\" (UID: \"3bc6cec6-bb3d-4506-85a2-37e118103804\") " pod="calico-apiserver/calico-apiserver-58c79c7d95-c4dc6" Feb 9 19:05:56.524642 kubelet[2464]: I0209 19:05:56.524631 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3bc6cec6-bb3d-4506-85a2-37e118103804-calico-apiserver-certs\") pod \"calico-apiserver-58c79c7d95-c4dc6\" (UID: \"3bc6cec6-bb3d-4506-85a2-37e118103804\") " pod="calico-apiserver/calico-apiserver-58c79c7d95-c4dc6" Feb 9 19:05:56.524757 kubelet[2464]: I0209 19:05:56.524748 2464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dzlns\" (UniqueName: \"kubernetes.io/projected/8f8a2ca8-a214-43bd-aefe-967aec7d78ed-kube-api-access-dzlns\") pod \"calico-apiserver-58c79c7d95-pz62v\" (UID: \"8f8a2ca8-a214-43bd-aefe-967aec7d78ed\") " pod="calico-apiserver/calico-apiserver-58c79c7d95-pz62v" Feb 9 19:05:56.507000 audit[4818]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd45110d20 a2=0 a3=7ffd45110d0c items=0 ppid=2638 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.551652 kernel: audit: type=1300 audit(1707505556.507:1362): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd45110d20 a2=0 a3=7ffd45110d0c items=0 ppid=2638 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.563885 kernel: audit: type=1327 audit(1707505556.507:1362): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.550000 audit[4818]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.550000 audit[4818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd45110d20 a2=0 a3=7ffd45110d0c items=0 ppid=2638 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.595507 kernel: audit: type=1325 audit(1707505556.550:1363): table=nat:123 family=2 entries=20 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.595674 kernel: audit: type=1300 audit(1707505556.550:1363): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd45110d20 a2=0 a3=7ffd45110d0c items=0 ppid=2638 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.608883 kernel: audit: type=1327 audit(1707505556.550:1363): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.608000 audit[4820]: NETFILTER_CFG table=filter:124 family=2 entries=9 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.623942 kernel: audit: type=1325 audit(1707505556.608:1364): table=filter:124 family=2 entries=9 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.608000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe96f893c0 a2=0 a3=7ffe96f893ac items=0 ppid=2638 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.648927 kernel: audit: type=1300 audit(1707505556.608:1364): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe96f893c0 a2=0 a3=7ffe96f893ac items=0 ppid=2638 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.649264 kubelet[2464]: E0209 19:05:56.649232 2464 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:05:56.649528 kubelet[2464]: E0209 19:05:56.649505 2464 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/8f8a2ca8-a214-43bd-aefe-967aec7d78ed-calico-apiserver-certs podName:8f8a2ca8-a214-43bd-aefe-967aec7d78ed nodeName:}" failed. No retries permitted until 2024-02-09 19:05:57.14948111 +0000 UTC m=+70.333646063 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/8f8a2ca8-a214-43bd-aefe-967aec7d78ed-calico-apiserver-certs") pod "calico-apiserver-58c79c7d95-pz62v" (UID: "8f8a2ca8-a214-43bd-aefe-967aec7d78ed") : secret "calico-apiserver-certs" not found Feb 9 19:05:56.650263 kubelet[2464]: E0209 19:05:56.650202 2464 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:05:56.650494 kubelet[2464]: E0209 19:05:56.650471 2464 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/3bc6cec6-bb3d-4506-85a2-37e118103804-calico-apiserver-certs podName:3bc6cec6-bb3d-4506-85a2-37e118103804 nodeName:}" failed. No retries permitted until 2024-02-09 19:05:57.150450915 +0000 UTC m=+70.334615768 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/3bc6cec6-bb3d-4506-85a2-37e118103804-calico-apiserver-certs") pod "calico-apiserver-58c79c7d95-c4dc6" (UID: "3bc6cec6-bb3d-4506-85a2-37e118103804") : secret "calico-apiserver-certs" not found Feb 9 19:05:56.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.609000 audit[4820]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.674505 kernel: audit: type=1327 audit(1707505556.608:1364): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:56.674666 kernel: audit: type=1325 audit(1707505556.609:1365): table=nat:125 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:05:56.609000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe96f893c0 a2=0 a3=7ffe96f893ac items=0 ppid=2638 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:56.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:05:57.350650 env[1319]: time="2024-02-09T19:05:57.350591973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58c79c7d95-c4dc6,Uid:3bc6cec6-bb3d-4506-85a2-37e118103804,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:05:57.370372 env[1319]: time="2024-02-09T19:05:57.370319265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58c79c7d95-pz62v,Uid:8f8a2ca8-a214-43bd-aefe-967aec7d78ed,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:05:57.417000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:57.417000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fc8820 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:57.417000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:57.418000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:57.418000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00208ca20 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:57.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:57.419000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:57.419000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00208cb40 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:57.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:57.432000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:05:57.432000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00208cca0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:05:57.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:05:57.639973 systemd-networkd[1450]: cali00fd8000c5e: Link UP Feb 9 19:05:57.651745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:05:57.651951 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali00fd8000c5e: link becomes ready Feb 9 19:05:57.652347 systemd-networkd[1450]: cali00fd8000c5e: Gained carrier Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.444 [INFO][4826] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0 calico-apiserver-58c79c7d95- calico-apiserver 3bc6cec6-bb3d-4506-85a2-37e118103804 925 0 2024-02-09 19:05:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58c79c7d95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f calico-apiserver-58c79c7d95-c4dc6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali00fd8000c5e [] []}} ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.445 [INFO][4826] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.546 [INFO][4849] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" HandleID="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.569 [INFO][4849] ipam_plugin.go 268: Auto assigning IP ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" HandleID="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051530), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"calico-apiserver-58c79c7d95-c4dc6", "timestamp":"2024-02-09 19:05:57.546963884 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.569 [INFO][4849] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.570 [INFO][4849] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.570 [INFO][4849] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.573 [INFO][4849] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.583 [INFO][4849] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.594 [INFO][4849] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.601 [INFO][4849] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.605 [INFO][4849] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.606 [INFO][4849] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.608 [INFO][4849] ipam.go 1682: Creating new handle: k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202 Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.612 [INFO][4849] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.620 [INFO][4849] ipam.go 1216: Successfully claimed IPs: [192.168.64.197/26] block=192.168.64.192/26 handle="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.620 [INFO][4849] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.197/26] handle="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.620 [INFO][4849] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:57.679833 env[1319]: 2024-02-09 19:05:57.620 [INFO][4849] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.197/26] IPv6=[] ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" HandleID="k8s-pod-network.85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.622 [INFO][4826] k8s.go 385: Populated endpoint ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0", GenerateName:"calico-apiserver-58c79c7d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"3bc6cec6-bb3d-4506-85a2-37e118103804", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58c79c7d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"calico-apiserver-58c79c7d95-c4dc6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00fd8000c5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.622 [INFO][4826] k8s.go 386: Calico CNI using IPs: [192.168.64.197/32] ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.622 [INFO][4826] dataplane_linux.go 68: Setting the host side veth name to cali00fd8000c5e ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.659 [INFO][4826] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.661 [INFO][4826] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0", GenerateName:"calico-apiserver-58c79c7d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"3bc6cec6-bb3d-4506-85a2-37e118103804", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58c79c7d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202", Pod:"calico-apiserver-58c79c7d95-c4dc6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00fd8000c5e", MAC:"c2:df:67:2f:48:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:57.680890 env[1319]: 2024-02-09 19:05:57.678 [INFO][4826] k8s.go 491: Wrote updated endpoint to datastore ContainerID="85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-c4dc6" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--c4dc6-eth0" Feb 9 19:05:57.710046 systemd-networkd[1450]: cali81beae7faec: Link UP Feb 9 19:05:57.731410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81beae7faec: link becomes ready Feb 9 19:05:57.736526 systemd-networkd[1450]: cali81beae7faec: Gained carrier Feb 9 19:05:57.738773 env[1319]: time="2024-02-09T19:05:57.738688473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:57.739025 env[1319]: time="2024-02-09T19:05:57.738988074Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:57.739156 env[1319]: time="2024-02-09T19:05:57.739130475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:57.739479 env[1319]: time="2024-02-09T19:05:57.739439476Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202 pid=4910 runtime=io.containerd.runc.v2 Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.497 [INFO][4837] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0 calico-apiserver-58c79c7d95- calico-apiserver 8f8a2ca8-a214-43bd-aefe-967aec7d78ed 928 0 2024-02-09 19:05:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58c79c7d95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-dbdb6b501f calico-apiserver-58c79c7d95-pz62v eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali81beae7faec [] []}} ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.497 [INFO][4837] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.594 [INFO][4855] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" HandleID="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.607 [INFO][4855] ipam_plugin.go 268: Auto assigning IP ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" HandleID="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ca20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-dbdb6b501f", "pod":"calico-apiserver-58c79c7d95-pz62v", "timestamp":"2024-02-09 19:05:57.5936778 +0000 UTC"}, Hostname:"ci-3510.3.2-a-dbdb6b501f", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.608 [INFO][4855] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.620 [INFO][4855] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.620 [INFO][4855] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-dbdb6b501f' Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.622 [INFO][4855] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.629 [INFO][4855] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.641 [INFO][4855] ipam.go 489: Trying affinity for 192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.646 [INFO][4855] ipam.go 155: Attempting to load block cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.662 [INFO][4855] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.192/26 host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.662 [INFO][4855] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.192/26 handle="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.671 [INFO][4855] ipam.go 1682: Creating new handle: k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.674 [INFO][4855] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.192/26 handle="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.697 [INFO][4855] ipam.go 1216: Successfully claimed IPs: [192.168.64.198/26] block=192.168.64.192/26 handle="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.697 [INFO][4855] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.198/26] handle="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" host="ci-3510.3.2-a-dbdb6b501f" Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.697 [INFO][4855] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:05:57.742506 env[1319]: 2024-02-09 19:05:57.697 [INFO][4855] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.198/26] IPv6=[] ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" HandleID="k8s-pod-network.d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Workload="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.699 [INFO][4837] k8s.go 385: Populated endpoint ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0", GenerateName:"calico-apiserver-58c79c7d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"8f8a2ca8-a214-43bd-aefe-967aec7d78ed", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58c79c7d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"", Pod:"calico-apiserver-58c79c7d95-pz62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81beae7faec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.699 [INFO][4837] k8s.go 386: Calico CNI using IPs: [192.168.64.198/32] ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.699 [INFO][4837] dataplane_linux.go 68: Setting the host side veth name to cali81beae7faec ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.707 [INFO][4837] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.708 [INFO][4837] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0", GenerateName:"calico-apiserver-58c79c7d95-", Namespace:"calico-apiserver", SelfLink:"", UID:"8f8a2ca8-a214-43bd-aefe-967aec7d78ed", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 5, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58c79c7d95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-dbdb6b501f", ContainerID:"d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c", Pod:"calico-apiserver-58c79c7d95-pz62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81beae7faec", MAC:"f2:6b:b9:2f:6a:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:05:57.743432 env[1319]: 2024-02-09 19:05:57.731 [INFO][4837] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c" Namespace="calico-apiserver" Pod="calico-apiserver-58c79c7d95-pz62v" WorkloadEndpoint="ci--3510.3.2--a--dbdb6b501f-k8s-calico--apiserver--58c79c7d95--pz62v-eth0" Feb 9 19:05:57.784000 audit[4932]: NETFILTER_CFG table=filter:126 family=2 entries=59 op=nft_register_chain pid=4932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:57.784000 audit[4932]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd680227f0 a2=0 a3=7ffd680227dc items=0 ppid=3778 pid=4932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:57.803876 env[1319]: time="2024-02-09T19:05:57.803778774Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:05:57.804151 env[1319]: time="2024-02-09T19:05:57.804109376Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:05:57.804322 env[1319]: time="2024-02-09T19:05:57.804296477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:05:57.804615 env[1319]: time="2024-02-09T19:05:57.804578778Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c pid=4942 runtime=io.containerd.runc.v2 Feb 9 19:05:57.855826 systemd[1]: Started cri-containerd-85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202.scope. Feb 9 19:05:57.873717 systemd[1]: Started cri-containerd-d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c.scope. Feb 9 19:05:57.863000 audit[4968]: NETFILTER_CFG table=filter:127 family=2 entries=50 op=nft_register_chain pid=4968 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:05:57.863000 audit[4968]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffc696bbde0 a2=0 a3=7ffc696bbdcc items=0 ppid=3778 pid=4968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.863000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.894000 audit: BPF prog-id=196 op=LOAD Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323131383462356637613332636362623734306331616162663436 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323131383462356637613332636362623734306331616162663436 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit: BPF prog-id=197 op=LOAD Feb 9 19:05:57.895000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000284ab0 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323131383462356637613332636362623734306331616162663436 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit: BPF prog-id=198 op=LOAD Feb 9 19:05:57.895000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000284af8 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323131383462356637613332636362623734306331616162663436 Feb 9 19:05:57.895000 audit: BPF prog-id=198 op=UNLOAD Feb 9 19:05:57.895000 audit: BPF prog-id=197 op=UNLOAD Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { perfmon } for pid=4957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit[4957]: AVC avc: denied { bpf } for pid=4957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.895000 audit: BPF prog-id=199 op=LOAD Feb 9 19:05:57.895000 audit[4957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000284f08 items=0 ppid=4942 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323131383462356637613332636362623734306331616162663436 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.910000 audit: BPF prog-id=200 op=LOAD Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4910 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835613030343533636138326663333539646239633031653532623232 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4910 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835613030343533636138326663333539646239633031653532623232 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit: BPF prog-id=201 op=LOAD Feb 9 19:05:57.911000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003acdc0 items=0 ppid=4910 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835613030343533636138326663333539646239633031653532623232 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.911000 audit: BPF prog-id=202 op=LOAD Feb 9 19:05:57.911000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003ace08 items=0 ppid=4910 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835613030343533636138326663333539646239633031653532623232 Feb 9 19:05:57.911000 audit: BPF prog-id=202 op=UNLOAD Feb 9 19:05:57.911000 audit: BPF prog-id=201 op=UNLOAD Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:05:57.912000 audit: BPF prog-id=203 op=LOAD Feb 9 19:05:57.912000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ad218 items=0 ppid=4910 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:05:57.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835613030343533636138326663333539646239633031653532623232 Feb 9 19:05:57.955323 env[1319]: time="2024-02-09T19:05:57.955232277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58c79c7d95-pz62v,Uid:8f8a2ca8-a214-43bd-aefe-967aec7d78ed,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c\"" Feb 9 19:05:57.963221 env[1319]: time="2024-02-09T19:05:57.962945712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:05:57.965249 env[1319]: time="2024-02-09T19:05:57.965201923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58c79c7d95-c4dc6,Uid:3bc6cec6-bb3d-4506-85a2-37e118103804,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202\"" Feb 9 19:05:58.690451 systemd[1]: run-containerd-runc-k8s.io-85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202-runc.n3629J.mount: Deactivated successfully. Feb 9 19:05:59.284159 systemd-networkd[1450]: cali00fd8000c5e: Gained IPv6LL Feb 9 19:05:59.412081 systemd-networkd[1450]: cali81beae7faec: Gained IPv6LL Feb 9 19:06:02.094151 env[1319]: time="2024-02-09T19:06:02.094092906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.099372 env[1319]: time="2024-02-09T19:06:02.099316529Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.104307 env[1319]: time="2024-02-09T19:06:02.104252951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.107964 env[1319]: time="2024-02-09T19:06:02.107921768Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.108533 env[1319]: time="2024-02-09T19:06:02.108496470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:06:02.110161 env[1319]: time="2024-02-09T19:06:02.110129578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:06:02.111479 env[1319]: time="2024-02-09T19:06:02.111441984Z" level=info msg="CreateContainer within sandbox \"d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:06:02.138760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3978416984.mount: Deactivated successfully. Feb 9 19:06:02.153541 env[1319]: time="2024-02-09T19:06:02.153480771Z" level=info msg="CreateContainer within sandbox \"d121184b5f7a32ccbb740c1aabf46ccfd6a4a7eacbb2c05a35f0a66519cfcd4c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789\"" Feb 9 19:06:02.154807 env[1319]: time="2024-02-09T19:06:02.154770177Z" level=info msg="StartContainer for \"58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789\"" Feb 9 19:06:02.192737 systemd[1]: Started cri-containerd-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789.scope. Feb 9 19:06:02.211949 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 19:06:02.212087 kernel: audit: type=1400 audit(1707505562.204:1408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238914 kernel: audit: type=1400 audit(1707505562.204:1409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.253144 kernel: audit: type=1400 audit(1707505562.204:1410): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273547 kernel: audit: type=1400 audit(1707505562.204:1411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.288871 kernel: audit: type=1400 audit(1707505562.204:1412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.316392 kernel: audit: type=1400 audit(1707505562.204:1413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.316730 kernel: audit: type=1400 audit(1707505562.204:1414): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.316757 kernel: audit: type=1400 audit(1707505562.204:1415): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.343116 kernel: audit: type=1400 audit(1707505562.204:1416): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.209000 audit: BPF prog-id=204 op=LOAD Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4942 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.358962 kernel: audit: type=1400 audit(1707505562.209:1417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623234353766616135353762386631346232376633393237313731 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4942 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623234353766616135353762386631346232376633393237313731 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.212000 audit: BPF prog-id=205 op=LOAD Feb 9 19:06:02.212000 audit[5019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7280 items=0 ppid=4942 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623234353766616135353762386631346232376633393237313731 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.238000 audit: BPF prog-id=206 op=LOAD Feb 9 19:06:02.238000 audit[5019]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d72c8 items=0 ppid=4942 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623234353766616135353762386631346232376633393237313731 Feb 9 19:06:02.273000 audit: BPF prog-id=206 op=UNLOAD Feb 9 19:06:02.273000 audit: BPF prog-id=205 op=UNLOAD Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { perfmon } for pid=5019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit[5019]: AVC avc: denied { bpf } for pid=5019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.273000 audit: BPF prog-id=207 op=LOAD Feb 9 19:06:02.273000 audit[5019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d76d8 items=0 ppid=4942 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623234353766616135353762386631346232376633393237313731 Feb 9 19:06:02.385086 env[1319]: time="2024-02-09T19:06:02.385017606Z" level=info msg="StartContainer for \"58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789\" returns successfully" Feb 9 19:06:02.669444 env[1319]: time="2024-02-09T19:06:02.669312077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.677076 env[1319]: time="2024-02-09T19:06:02.677014011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.682058 env[1319]: time="2024-02-09T19:06:02.681998034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.687396 env[1319]: time="2024-02-09T19:06:02.687303757Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:06:02.687855 env[1319]: time="2024-02-09T19:06:02.687801060Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:06:02.694224 env[1319]: time="2024-02-09T19:06:02.694168988Z" level=info msg="CreateContainer within sandbox \"85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:06:02.728591 env[1319]: time="2024-02-09T19:06:02.728529842Z" level=info msg="CreateContainer within sandbox \"85a00453ca82fc359db9c01e52b22d5b52b3d1995a303af9a2ad004fcb516202\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434\"" Feb 9 19:06:02.729543 env[1319]: time="2024-02-09T19:06:02.729494746Z" level=info msg="StartContainer for \"03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434\"" Feb 9 19:06:02.752328 systemd[1]: Started cri-containerd-03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434.scope. Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.778000 audit: BPF prog-id=208 op=LOAD Feb 9 19:06:02.779000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.779000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4910 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653335363565643133333130646464666631353536656338366530 Feb 9 19:06:02.779000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.779000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4910 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653335363565643133333130646464666631353536656338366530 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.780000 audit: BPF prog-id=209 op=LOAD Feb 9 19:06:02.780000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001da0e0 items=0 ppid=4910 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653335363565643133333130646464666631353536656338366530 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.781000 audit: BPF prog-id=210 op=LOAD Feb 9 19:06:02.781000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001da128 items=0 ppid=4910 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653335363565643133333130646464666631353536656338366530 Feb 9 19:06:02.782000 audit: BPF prog-id=210 op=UNLOAD Feb 9 19:06:02.782000 audit: BPF prog-id=209 op=UNLOAD Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:06:02.782000 audit: BPF prog-id=211 op=LOAD Feb 9 19:06:02.782000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001da538 items=0 ppid=4910 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:02.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653335363565643133333130646464666631353536656338366530 Feb 9 19:06:02.852676 env[1319]: time="2024-02-09T19:06:02.852608396Z" level=info msg="StartContainer for \"03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434\" returns successfully" Feb 9 19:06:02.874000 audit[5030]: AVC avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:06:02.874000 audit[5030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005cdb80 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:06:02.874000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:06:03.375607 kubelet[2464]: I0209 19:06:03.375567 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58c79c7d95-pz62v" podStartSLOduration=3.228785358 podCreationTimestamp="2024-02-09 19:05:56 +0000 UTC" firstStartedPulling="2024-02-09 19:05:57.962288709 +0000 UTC m=+71.146453562" lastFinishedPulling="2024-02-09 19:06:02.108996373 +0000 UTC m=+75.293161226" observedRunningTime="2024-02-09 19:06:03.361013458 +0000 UTC m=+76.545178411" watchObservedRunningTime="2024-02-09 19:06:03.375493022 +0000 UTC m=+76.559657875" Feb 9 19:06:03.380000 audit[5068]: AVC avc: denied { watch } for pid=5068 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.272684834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c675 tclass=file permissive=0 Feb 9 19:06:03.380000 audit[5068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b62c00 a2=fc6 a3=0 items=0 ppid=4910 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 key=(null) Feb 9 19:06:03.380000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:06:03.396000 audit[5090]: NETFILTER_CFG table=filter:128 family=2 entries=10 op=nft_register_rule pid=5090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:03.396000 audit[5090]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffffc017370 a2=0 a3=7ffffc01735c items=0 ppid=2638 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:03.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:03.397000 audit[5090]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=5090 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:03.397000 audit[5090]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffffc017370 a2=0 a3=7ffffc01735c items=0 ppid=2638 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:03.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:03.409000 audit[5092]: NETFILTER_CFG table=filter:130 family=2 entries=10 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:03.409000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdabcfbd70 a2=0 a3=7ffdabcfbd5c items=0 ppid=2638 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:03.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:03.410000 audit[5092]: NETFILTER_CFG table=nat:131 family=2 entries=20 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:03.410000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdabcfbd70 a2=0 a3=7ffdabcfbd5c items=0 ppid=2638 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:03.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.375156 systemd[1]: run-containerd-runc-k8s.io-03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434-runc.l2icBd.mount: Deactivated successfully. Feb 9 19:06:27.412283 systemd[1]: run-containerd-runc-k8s.io-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789-runc.bHcQ1e.mount: Deactivated successfully. Feb 9 19:06:27.462487 kubelet[2464]: I0209 19:06:27.462444 2464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58c79c7d95-c4dc6" podStartSLOduration=26.740157209 podCreationTimestamp="2024-02-09 19:05:56 +0000 UTC" firstStartedPulling="2024-02-09 19:05:57.967056631 +0000 UTC m=+71.151221584" lastFinishedPulling="2024-02-09 19:06:02.689294366 +0000 UTC m=+75.873459219" observedRunningTime="2024-02-09 19:06:03.37733873 +0000 UTC m=+76.561503583" watchObservedRunningTime="2024-02-09 19:06:27.462394844 +0000 UTC m=+100.646559797" Feb 9 19:06:27.512880 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 19:06:27.513066 kernel: audit: type=1325 audit(1707505587.501:1450): table=filter:132 family=2 entries=9 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.501000 audit[5169]: NETFILTER_CFG table=filter:132 family=2 entries=9 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.501000 audit[5169]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffa6ff4eb0 a2=0 a3=7fffa6ff4e9c items=0 ppid=2638 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.539870 kernel: audit: type=1300 audit(1707505587.501:1450): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffa6ff4eb0 a2=0 a3=7fffa6ff4e9c items=0 ppid=2638 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.551881 kernel: audit: type=1327 audit(1707505587.501:1450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.501000 audit[5169]: NETFILTER_CFG table=nat:133 family=2 entries=27 op=nft_register_chain pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.563026 kernel: audit: type=1325 audit(1707505587.501:1451): table=nat:133 family=2 entries=27 op=nft_register_chain pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.501000 audit[5169]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fffa6ff4eb0 a2=0 a3=7fffa6ff4e9c items=0 ppid=2638 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.595754 kernel: audit: type=1300 audit(1707505587.501:1451): arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fffa6ff4eb0 a2=0 a3=7fffa6ff4e9c items=0 ppid=2638 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.595949 kernel: audit: type=1327 audit(1707505587.501:1451): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.557000 audit[5171]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.631056 kernel: audit: type=1325 audit(1707505587.557:1452): table=filter:134 family=2 entries=8 op=nft_register_rule pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.631372 kernel: audit: type=1300 audit(1707505587.557:1452): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff0b17d0d0 a2=0 a3=7fff0b17d0bc items=0 ppid=2638 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.557000 audit[5171]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff0b17d0d0 a2=0 a3=7fff0b17d0bc items=0 ppid=2638 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.644008 kernel: audit: type=1327 audit(1707505587.557:1452): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:27.562000 audit[5171]: NETFILTER_CFG table=nat:135 family=2 entries=34 op=nft_register_chain pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.655870 kernel: audit: type=1325 audit(1707505587.562:1453): table=nat:135 family=2 entries=34 op=nft_register_chain pid=5171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:06:27.562000 audit[5171]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7fff0b17d0d0 a2=0 a3=7fff0b17d0bc items=0 ppid=2638 pid=5171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:06:27.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:06:34.619115 systemd[1]: run-containerd-runc-k8s.io-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596-runc.iRU5Ow.mount: Deactivated successfully. Feb 9 19:06:42.374000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.381287 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:06:42.381410 kernel: audit: type=1400 audit(1707505602.374:1454): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.374000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.374000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fc29a0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:42.474387 kernel: audit: type=1400 audit(1707505602.374:1455): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.475659 kernel: audit: type=1300 audit(1707505602.374:1455): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fc29a0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:42.477024 kernel: audit: type=1327 audit(1707505602.374:1455): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:42.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:42.374000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c1f50 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:42.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:42.552958 kernel: audit: type=1300 audit(1707505602.374:1454): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c1f50 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:42.553134 kernel: audit: type=1327 audit(1707505602.374:1454): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:42.804000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.823928 kernel: audit: type=1400 audit(1707505602.804:1456): avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.824087 kernel: audit: type=1400 audit(1707505602.804:1457): avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.804000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.804000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00752df80 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.860982 kernel: audit: type=1300 audit(1707505602.804:1457): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00752df80 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.861108 kernel: audit: type=1327 audit(1707505602.804:1457): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.804000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.804000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00c969b00 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.804000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00c64ce40 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.815000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.815000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0075155e0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.815000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.815000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00c64d170 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:42.815000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:42.815000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00c969b30 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:06:42.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:06:57.373803 systemd[1]: run-containerd-runc-k8s.io-03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434-runc.afJShP.mount: Deactivated successfully. Feb 9 19:06:57.407944 systemd[1]: run-containerd-runc-k8s.io-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789-runc.N7iSqZ.mount: Deactivated successfully. Feb 9 19:06:57.429866 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 19:06:57.430005 kernel: audit: type=1400 audit(1707505617.420:1462): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.420000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.420000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afe160 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.470024 kernel: audit: type=1300 audit(1707505617.420:1462): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afe160 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.491103 kernel: audit: type=1327 audit(1707505617.420:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.420000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.420000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002482fa0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.532889 kernel: audit: type=1400 audit(1707505617.420:1463): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.533095 kernel: audit: type=1300 audit(1707505617.420:1463): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002482fa0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.554872 kernel: audit: type=1327 audit(1707505617.420:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.420000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.575887 kernel: audit: type=1400 audit(1707505617.420:1464): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.576036 kernel: audit: type=1300 audit(1707505617.420:1464): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002482fc0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.420000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002482fc0 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.623931 kernel: audit: type=1327 audit(1707505617.420:1464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:06:57.625317 kernel: audit: type=1400 audit(1707505617.433:1465): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.433000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:06:57.433000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000afe520 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:06:57.433000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:02.876000 audit[5030]: AVC avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:07:02.906831 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:07:02.907382 kernel: audit: type=1400 audit(1707505622.876:1466): avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:07:02.908529 kernel: audit: type=1300 audit(1707505622.876:1466): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018eb3c0 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:07:02.876000 audit[5030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018eb3c0 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:07:02.876000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:07:02.959670 kernel: audit: type=1327 audit(1707505622.876:1466): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:07:03.389000 audit[5068]: AVC avc: denied { watch } for pid=5068 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.272684834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c675 tclass=file permissive=0 Feb 9 19:07:03.412875 kernel: audit: type=1400 audit(1707505623.389:1467): avc: denied { watch } for pid=5068 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.272684834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c675 tclass=file permissive=0 Feb 9 19:07:03.389000 audit[5068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a16a40 a2=fc6 a3=0 items=0 ppid=4910 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 key=(null) Feb 9 19:07:03.389000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:07:03.453838 kernel: audit: type=1300 audit(1707505623.389:1467): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a16a40 a2=fc6 a3=0 items=0 ppid=4910 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 key=(null) Feb 9 19:07:03.454041 kernel: audit: type=1327 audit(1707505623.389:1467): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:07:20.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.31:22-10.200.12.6:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:20.147557 systemd[1]: Started sshd@7-10.200.8.31:22-10.200.12.6:41452.service. Feb 9 19:07:20.167231 kernel: audit: type=1130 audit(1707505640.146:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.31:22-10.200.12.6:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:20.770000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.793143 sshd[5331]: Accepted publickey for core from 10.200.12.6 port 41452 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:20.792000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.793673 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:20.799397 systemd[1]: Started session-10.scope. Feb 9 19:07:20.800536 systemd-logind[1303]: New session 10 of user core. Feb 9 19:07:20.811312 kernel: audit: type=1101 audit(1707505640.770:1469): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.811413 kernel: audit: type=1103 audit(1707505640.792:1470): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.821940 kernel: audit: type=1006 audit(1707505640.792:1471): pid=5331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:07:20.822125 kernel: audit: type=1300 audit(1707505640.792:1471): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ca7a380 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.792000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ca7a380 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:20.841037 kernel: audit: type=1327 audit(1707505640.792:1471): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:20.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:20.847054 kernel: audit: type=1105 audit(1707505640.805:1472): pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.805000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.807000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:20.870920 kernel: audit: type=1103 audit(1707505640.807:1473): pid=5333 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:21.121894 systemd[1]: run-containerd-runc-k8s.io-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8-runc.Ts0VXu.mount: Deactivated successfully. Feb 9 19:07:21.363906 sshd[5331]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:21.364000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:21.367022 systemd[1]: sshd@7-10.200.8.31:22-10.200.12.6:41452.service: Deactivated successfully. Feb 9 19:07:21.368304 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:07:21.375439 systemd-logind[1303]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:07:21.376519 systemd-logind[1303]: Removed session 10. Feb 9 19:07:21.385907 kernel: audit: type=1106 audit(1707505641.364:1474): pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:21.364000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:21.404875 kernel: audit: type=1104 audit(1707505641.364:1475): pid=5331 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:21.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.31:22-10.200.12.6:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:26.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.31:22-10.200.12.6:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:26.468277 systemd[1]: Started sshd@8-10.200.8.31:22-10.200.12.6:41466.service. Feb 9 19:07:26.474140 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:07:26.474235 kernel: audit: type=1130 audit(1707505646.467:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.31:22-10.200.12.6:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:27.087000 audit[5369]: USER_ACCT pid=5369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.109429 sshd[5369]: Accepted publickey for core from 10.200.12.6 port 41466 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:27.109872 kernel: audit: type=1101 audit(1707505647.087:1478): pid=5369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.110083 sshd[5369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:27.108000 audit[5369]: CRED_ACQ pid=5369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.115969 systemd[1]: Started session-11.scope. Feb 9 19:07:27.117296 systemd-logind[1303]: New session 11 of user core. Feb 9 19:07:27.138613 kernel: audit: type=1103 audit(1707505647.108:1479): pid=5369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.138815 kernel: audit: type=1006 audit(1707505647.108:1480): pid=5369 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:07:27.139066 kernel: audit: type=1300 audit(1707505647.108:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f647f30 a2=3 a3=0 items=0 ppid=1 pid=5369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:27.108000 audit[5369]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9f647f30 a2=3 a3=0 items=0 ppid=1 pid=5369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:27.157097 kernel: audit: type=1327 audit(1707505647.108:1480): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:27.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:27.121000 audit[5369]: USER_START pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.162956 kernel: audit: type=1105 audit(1707505647.121:1481): pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.124000 audit[5371]: CRED_ACQ pid=5371 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.181962 kernel: audit: type=1103 audit(1707505647.124:1482): pid=5371 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.374734 systemd[1]: run-containerd-runc-k8s.io-03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434-runc.hAJBZ3.mount: Deactivated successfully. Feb 9 19:07:27.406667 systemd[1]: run-containerd-runc-k8s.io-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789-runc.JHA0EJ.mount: Deactivated successfully. Feb 9 19:07:27.609000 audit[5369]: USER_END pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.608916 sshd[5369]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:27.612382 systemd[1]: sshd@8-10.200.8.31:22-10.200.12.6:41466.service: Deactivated successfully. Feb 9 19:07:27.613309 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:07:27.614749 systemd-logind[1303]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:07:27.615691 systemd-logind[1303]: Removed session 11. Feb 9 19:07:27.631353 kernel: audit: type=1106 audit(1707505647.609:1483): pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.631516 kernel: audit: type=1104 audit(1707505647.609:1484): pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.609000 audit[5369]: CRED_DISP pid=5369 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:27.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.31:22-10.200.12.6:41466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:32.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.31:22-10.200.12.6:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:32.715678 systemd[1]: Started sshd@9-10.200.8.31:22-10.200.12.6:43892.service. Feb 9 19:07:32.721646 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:07:32.723498 kernel: audit: type=1130 audit(1707505652.715:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.31:22-10.200.12.6:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:33.377930 kernel: audit: type=1101 audit(1707505653.356:1487): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.356000 audit[5438]: USER_ACCT pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.378225 sshd[5438]: Accepted publickey for core from 10.200.12.6 port 43892 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:33.378320 sshd[5438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:33.376000 audit[5438]: CRED_ACQ pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.389306 systemd[1]: Started session-12.scope. Feb 9 19:07:33.390487 systemd-logind[1303]: New session 12 of user core. Feb 9 19:07:33.409737 kernel: audit: type=1103 audit(1707505653.376:1488): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.409956 kernel: audit: type=1006 audit(1707505653.377:1489): pid=5438 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:07:33.409988 kernel: audit: type=1300 audit(1707505653.377:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaf9b7f30 a2=3 a3=0 items=0 ppid=1 pid=5438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:33.377000 audit[5438]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaf9b7f30 a2=3 a3=0 items=0 ppid=1 pid=5438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:33.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:33.432554 kernel: audit: type=1327 audit(1707505653.377:1489): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:33.396000 audit[5438]: USER_START pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.452948 kernel: audit: type=1105 audit(1707505653.396:1490): pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.453047 kernel: audit: type=1103 audit(1707505653.398:1491): pid=5440 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.398000 audit[5440]: CRED_ACQ pid=5440 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.868469 sshd[5438]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:33.869000 audit[5438]: USER_END pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.872241 systemd[1]: sshd@9-10.200.8.31:22-10.200.12.6:43892.service: Deactivated successfully. Feb 9 19:07:33.873144 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:07:33.875054 systemd-logind[1303]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:07:33.876071 systemd-logind[1303]: Removed session 12. Feb 9 19:07:33.869000 audit[5438]: CRED_DISP pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.908353 kernel: audit: type=1106 audit(1707505653.869:1492): pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.908518 kernel: audit: type=1104 audit(1707505653.869:1493): pid=5438 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:33.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.31:22-10.200.12.6:43892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:34.614077 systemd[1]: run-containerd-runc-k8s.io-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596-runc.RWVXrK.mount: Deactivated successfully. Feb 9 19:07:38.973803 systemd[1]: Started sshd@10-10.200.8.31:22-10.200.12.6:45960.service. Feb 9 19:07:38.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.31:22-10.200.12.6:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:38.979851 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:07:38.979939 kernel: audit: type=1130 audit(1707505658.973:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.31:22-10.200.12.6:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:39.589000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.610389 sshd[5472]: Accepted publickey for core from 10.200.12.6 port 45960 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:39.610873 kernel: audit: type=1101 audit(1707505659.589:1496): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.610897 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:39.609000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.625526 systemd[1]: Started session-13.scope. Feb 9 19:07:39.626784 systemd-logind[1303]: New session 13 of user core. Feb 9 19:07:39.637890 kernel: audit: type=1103 audit(1707505659.609:1497): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.637995 kernel: audit: type=1006 audit(1707505659.609:1498): pid=5472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 19:07:39.609000 audit[5472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03b897c0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.669439 kernel: audit: type=1300 audit(1707505659.609:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03b897c0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:39.670729 kernel: audit: type=1327 audit(1707505659.609:1498): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:39.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:39.634000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.695509 kernel: audit: type=1105 audit(1707505659.634:1499): pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.695614 kernel: audit: type=1103 audit(1707505659.640:1500): pid=5474 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:39.640000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.092113 sshd[5472]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:40.092000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.096279 systemd[1]: sshd@10-10.200.8.31:22-10.200.12.6:45960.service: Deactivated successfully. Feb 9 19:07:40.097207 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:07:40.098668 systemd-logind[1303]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:07:40.099696 systemd-logind[1303]: Removed session 13. Feb 9 19:07:40.093000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.134169 kernel: audit: type=1106 audit(1707505660.092:1501): pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.134345 kernel: audit: type=1104 audit(1707505660.093:1502): pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.31:22-10.200.12.6:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:40.197866 systemd[1]: Started sshd@11-10.200.8.31:22-10.200.12.6:45966.service. Feb 9 19:07:40.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.31:22-10.200.12.6:45966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:40.813246 sshd[5485]: Accepted publickey for core from 10.200.12.6 port 45966 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:40.812000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.814000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.814000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa11ee8d0 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:40.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:40.815494 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:40.820831 systemd-logind[1303]: New session 14 of user core. Feb 9 19:07:40.821473 systemd[1]: Started session-14.scope. Feb 9 19:07:40.825000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:40.827000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.017198 sshd[5485]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:42.018000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.018000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.022021 systemd[1]: sshd@11-10.200.8.31:22-10.200.12.6:45966.service: Deactivated successfully. Feb 9 19:07:42.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.31:22-10.200.12.6:45966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:42.025137 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:07:42.026203 systemd-logind[1303]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:07:42.027472 systemd-logind[1303]: Removed session 14. Feb 9 19:07:42.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.31:22-10.200.12.6:45974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:42.135751 systemd[1]: Started sshd@12-10.200.8.31:22-10.200.12.6:45974.service. Feb 9 19:07:42.377000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.377000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fc9f00 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:42.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:42.378000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.378000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002529140 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:42.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:42.778000 audit[5495]: USER_ACCT pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.779400 sshd[5495]: Accepted publickey for core from 10.200.12.6 port 45974 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:42.779000 audit[5495]: CRED_ACQ pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.779000 audit[5495]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e808dc0 a2=3 a3=0 items=0 ppid=1 pid=5495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:42.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:42.781059 sshd[5495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:42.784974 systemd-logind[1303]: New session 15 of user core. Feb 9 19:07:42.787115 systemd[1]: Started session-15.scope. Feb 9 19:07:42.791000 audit[5495]: USER_START pid=5495 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.792000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:42.805000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.805000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.805000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0141e84e0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:42.805000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01421aae0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:42.805000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.805000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0141bcf60 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:42.816000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.816000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01421ab70 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:42.816000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.816000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0141f1f80 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:42.816000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:42.816000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01421abd0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:07:42.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:07:43.295723 sshd[5495]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:43.296000 audit[5495]: USER_END pid=5495 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:43.296000 audit[5495]: CRED_DISP pid=5495 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:43.298919 systemd[1]: sshd@12-10.200.8.31:22-10.200.12.6:45974.service: Deactivated successfully. Feb 9 19:07:43.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.31:22-10.200.12.6:45974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:43.299928 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:07:43.301037 systemd-logind[1303]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:07:43.304750 systemd-logind[1303]: Removed session 15. Feb 9 19:07:48.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.31:22-10.200.12.6:56072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:48.401590 systemd[1]: Started sshd@13-10.200.8.31:22-10.200.12.6:56072.service. Feb 9 19:07:48.414989 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 19:07:48.416514 kernel: audit: type=1130 audit(1707505668.400:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.31:22-10.200.12.6:56072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:49.019000 audit[5514]: USER_ACCT pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.040014 kernel: audit: type=1101 audit(1707505669.019:1531): pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.040076 sshd[5514]: Accepted publickey for core from 10.200.12.6 port 56072 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:49.040406 sshd[5514]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:49.039000 audit[5514]: CRED_ACQ pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.046010 systemd[1]: Started session-16.scope. Feb 9 19:07:49.047256 systemd-logind[1303]: New session 16 of user core. Feb 9 19:07:49.060944 kernel: audit: type=1103 audit(1707505669.039:1532): pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.061040 kernel: audit: type=1006 audit(1707505669.039:1533): pid=5514 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:07:49.039000 audit[5514]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4b512d40 a2=3 a3=0 items=0 ppid=1 pid=5514 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:49.071030 kernel: audit: type=1300 audit(1707505669.039:1533): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4b512d40 a2=3 a3=0 items=0 ppid=1 pid=5514 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:49.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:49.096143 kernel: audit: type=1327 audit(1707505669.039:1533): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:49.096272 kernel: audit: type=1105 audit(1707505669.050:1534): pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.050000 audit[5514]: USER_START pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.050000 audit[5516]: CRED_ACQ pid=5516 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.132882 kernel: audit: type=1103 audit(1707505669.050:1535): pid=5516 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.549750 sshd[5514]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:49.550000 audit[5514]: USER_END pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.557728 systemd-logind[1303]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:07:49.558772 systemd[1]: sshd@13-10.200.8.31:22-10.200.12.6:56072.service: Deactivated successfully. Feb 9 19:07:49.559684 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:07:49.561461 systemd-logind[1303]: Removed session 16. Feb 9 19:07:49.550000 audit[5514]: CRED_DISP pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.591018 kernel: audit: type=1106 audit(1707505669.550:1536): pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.591190 kernel: audit: type=1104 audit(1707505669.550:1537): pid=5514 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:49.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.31:22-10.200.12.6:56072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:51.113256 systemd[1]: run-containerd-runc-k8s.io-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8-runc.PEkXW8.mount: Deactivated successfully. Feb 9 19:07:54.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.31:22-10.200.12.6:56074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:54.656901 systemd[1]: Started sshd@14-10.200.8.31:22-10.200.12.6:56074.service. Feb 9 19:07:54.667685 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:07:54.667831 kernel: audit: type=1130 audit(1707505674.656:1539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.31:22-10.200.12.6:56074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:55.279000 audit[5546]: USER_ACCT pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.283157 sshd[5546]: Accepted publickey for core from 10.200.12.6 port 56074 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:07:55.303862 kernel: audit: type=1101 audit(1707505675.279:1540): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.303516 sshd[5546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:07:55.302000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.313558 systemd[1]: Started session-17.scope. Feb 9 19:07:55.315013 systemd-logind[1303]: New session 17 of user core. Feb 9 19:07:55.334739 kernel: audit: type=1103 audit(1707505675.302:1541): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.334919 kernel: audit: type=1006 audit(1707505675.302:1542): pid=5546 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:07:55.334960 kernel: audit: type=1300 audit(1707505675.302:1542): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4b1ed720 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:55.302000 audit[5546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4b1ed720 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:07:55.302000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:55.359877 kernel: audit: type=1327 audit(1707505675.302:1542): proctitle=737368643A20636F7265205B707269765D Feb 9 19:07:55.318000 audit[5546]: USER_START pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.385350 kernel: audit: type=1105 audit(1707505675.318:1543): pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.385917 kernel: audit: type=1103 audit(1707505675.318:1544): pid=5548 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.318000 audit[5548]: CRED_ACQ pid=5548 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.806434 sshd[5546]: pam_unix(sshd:session): session closed for user core Feb 9 19:07:55.807000 audit[5546]: USER_END pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.810594 systemd[1]: sshd@14-10.200.8.31:22-10.200.12.6:56074.service: Deactivated successfully. Feb 9 19:07:55.811662 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:07:55.813262 systemd-logind[1303]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:07:55.814278 systemd-logind[1303]: Removed session 17. Feb 9 19:07:55.807000 audit[5546]: CRED_DISP pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.844859 kernel: audit: type=1106 audit(1707505675.807:1545): pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.844998 kernel: audit: type=1104 audit(1707505675.807:1546): pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:07:55.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.31:22-10.200.12.6:56074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:07:57.421000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:57.421000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00272b300 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:57.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:57.421000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:57.421000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00272b320 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:57.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:57.423000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:57.423000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002482360 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:57.423000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:07:57.435000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:07:57.435000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00272b640 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:07:57.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:00.915360 systemd[1]: Started sshd@15-10.200.8.31:22-10.200.12.6:43650.service. Feb 9 19:08:00.936924 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:08:00.937074 kernel: audit: type=1130 audit(1707505680.921:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.31:22-10.200.12.6:43650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:00.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.31:22-10.200.12.6:43650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:01.558000 audit[5613]: USER_ACCT pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.580985 kernel: audit: type=1101 audit(1707505681.558:1553): pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.561373 sshd[5613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:01.581390 sshd[5613]: Accepted publickey for core from 10.200.12.6 port 43650 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:01.587875 systemd[1]: Started session-18.scope. Feb 9 19:08:01.589203 systemd-logind[1303]: New session 18 of user core. Feb 9 19:08:01.560000 audit[5613]: CRED_ACQ pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.622999 kernel: audit: type=1103 audit(1707505681.560:1554): pid=5613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.635891 kernel: audit: type=1006 audit(1707505681.560:1555): pid=5613 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 19:08:01.560000 audit[5613]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefca77300 a2=3 a3=0 items=0 ppid=1 pid=5613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:01.560000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:01.660671 kernel: audit: type=1300 audit(1707505681.560:1555): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefca77300 a2=3 a3=0 items=0 ppid=1 pid=5613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:01.660814 kernel: audit: type=1327 audit(1707505681.560:1555): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:01.600000 audit[5613]: USER_START pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.602000 audit[5615]: CRED_ACQ pid=5615 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.701496 kernel: audit: type=1105 audit(1707505681.600:1556): pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:01.701679 kernel: audit: type=1103 audit(1707505681.602:1557): pid=5615 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.100176 sshd[5613]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:02.101000 audit[5613]: USER_END pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.103664 systemd[1]: sshd@15-10.200.8.31:22-10.200.12.6:43650.service: Deactivated successfully. Feb 9 19:08:02.104548 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:08:02.106238 systemd-logind[1303]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:08:02.107184 systemd-logind[1303]: Removed session 18. Feb 9 19:08:02.124996 kernel: audit: type=1106 audit(1707505682.101:1558): pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.125148 kernel: audit: type=1104 audit(1707505682.101:1559): pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.101000 audit[5613]: CRED_DISP pid=5613 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.31:22-10.200.12.6:43650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:02.206288 systemd[1]: Started sshd@16-10.200.8.31:22-10.200.12.6:43654.service. Feb 9 19:08:02.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.31:22-10.200.12.6:43654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:02.822000 audit[5626]: USER_ACCT pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.823547 sshd[5626]: Accepted publickey for core from 10.200.12.6 port 43654 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:02.823000 audit[5626]: CRED_ACQ pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.823000 audit[5626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25771dc0 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:02.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:02.825153 sshd[5626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:02.830450 systemd[1]: Started session-19.scope. Feb 9 19:08:02.830934 systemd-logind[1303]: New session 19 of user core. Feb 9 19:08:02.835000 audit[5626]: USER_START pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.836000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:02.881000 audit[5030]: AVC avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:08:02.881000 audit[5030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001aa22c0 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:08:02.881000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:08:03.387239 sshd[5626]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:03.388000 audit[5626]: USER_END pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:03.388000 audit[5626]: CRED_DISP pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:03.390920 systemd[1]: sshd@16-10.200.8.31:22-10.200.12.6:43654.service: Deactivated successfully. Feb 9 19:08:03.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.31:22-10.200.12.6:43654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:03.391000 audit[5068]: AVC avc: denied { watch } for pid=5068 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.272684834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c675 tclass=file permissive=0 Feb 9 19:08:03.391000 audit[5068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00099e0c0 a2=fc6 a3=0 items=0 ppid=4910 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 key=(null) Feb 9 19:08:03.392180 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:08:03.391000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:08:03.393523 systemd-logind[1303]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:08:03.394470 systemd-logind[1303]: Removed session 19. Feb 9 19:08:03.500818 systemd[1]: Started sshd@17-10.200.8.31:22-10.200.12.6:43662.service. Feb 9 19:08:03.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.31:22-10.200.12.6:43662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:04.114000 audit[5635]: USER_ACCT pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:04.115283 sshd[5635]: Accepted publickey for core from 10.200.12.6 port 43662 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:04.115000 audit[5635]: CRED_ACQ pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:04.115000 audit[5635]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b91fdd0 a2=3 a3=0 items=0 ppid=1 pid=5635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:04.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:04.116975 sshd[5635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:04.122556 systemd[1]: Started session-20.scope. Feb 9 19:08:04.123054 systemd-logind[1303]: New session 20 of user core. Feb 9 19:08:04.127000 audit[5635]: USER_START pid=5635 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:04.128000 audit[5637]: CRED_ACQ pid=5637 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:05.540000 audit[5647]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:05.540000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd1828b6b0 a2=0 a3=7ffd1828b69c items=0 ppid=2638 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:05.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:05.541000 audit[5647]: NETFILTER_CFG table=nat:137 family=2 entries=22 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:05.541000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffd1828b6b0 a2=0 a3=31030 items=0 ppid=2638 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:05.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:05.563000 audit[5649]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=5649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:05.563000 audit[5649]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffdfee984a0 a2=0 a3=7ffdfee9848c items=0 ppid=2638 pid=5649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:05.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:05.565000 audit[5649]: NETFILTER_CFG table=nat:139 family=2 entries=22 op=nft_register_rule pid=5649 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:05.565000 audit[5649]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffdfee984a0 a2=0 a3=31030 items=0 ppid=2638 pid=5649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:05.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:05.636161 sshd[5635]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:05.637000 audit[5635]: USER_END pid=5635 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:05.637000 audit[5635]: CRED_DISP pid=5635 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:05.640011 systemd[1]: sshd@17-10.200.8.31:22-10.200.12.6:43662.service: Deactivated successfully. Feb 9 19:08:05.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.31:22-10.200.12.6:43662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:05.641178 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:08:05.641993 systemd-logind[1303]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:08:05.643157 systemd-logind[1303]: Removed session 20. Feb 9 19:08:05.743267 systemd[1]: Started sshd@18-10.200.8.31:22-10.200.12.6:43668.service. Feb 9 19:08:05.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.31:22-10.200.12.6:43668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:06.377473 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 9 19:08:06.377609 kernel: audit: type=1101 audit(1707505686.369:1586): pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.369000 audit[5652]: USER_ACCT pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.377166 sshd[5652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:06.377999 sshd[5652]: Accepted publickey for core from 10.200.12.6 port 43668 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:06.383792 systemd[1]: Started session-21.scope. Feb 9 19:08:06.385232 systemd-logind[1303]: New session 21 of user core. Feb 9 19:08:06.375000 audit[5652]: CRED_ACQ pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.411745 kernel: audit: type=1103 audit(1707505686.375:1587): pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.375000 audit[5652]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d721d60 a2=3 a3=0 items=0 ppid=1 pid=5652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:06.440690 kernel: audit: type=1006 audit(1707505686.375:1588): pid=5652 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 19:08:06.440815 kernel: audit: type=1300 audit(1707505686.375:1588): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d721d60 a2=3 a3=0 items=0 ppid=1 pid=5652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:06.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:06.390000 audit[5652]: USER_START pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.466818 kernel: audit: type=1327 audit(1707505686.375:1588): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:06.467006 kernel: audit: type=1105 audit(1707505686.390:1589): pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.392000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:06.483885 kernel: audit: type=1103 audit(1707505686.392:1590): pid=5654 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.120129 sshd[5652]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:07.121000 audit[5652]: USER_END pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.124426 systemd[1]: sshd@18-10.200.8.31:22-10.200.12.6:43668.service: Deactivated successfully. Feb 9 19:08:07.125539 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:08:07.127265 systemd-logind[1303]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:08:07.128623 systemd-logind[1303]: Removed session 21. Feb 9 19:08:07.147889 kernel: audit: type=1106 audit(1707505687.121:1591): pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.148006 kernel: audit: type=1104 audit(1707505687.121:1592): pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.121000 audit[5652]: CRED_DISP pid=5652 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.31:22-10.200.12.6:43668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:07.190267 kernel: audit: type=1131 audit(1707505687.123:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.31:22-10.200.12.6:43668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:07.225664 systemd[1]: Started sshd@19-10.200.8.31:22-10.200.12.6:42624.service. Feb 9 19:08:07.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.31:22-10.200.12.6:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:07.843000 audit[5663]: USER_ACCT pid=5663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.844311 sshd[5663]: Accepted publickey for core from 10.200.12.6 port 42624 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:07.844000 audit[5663]: CRED_ACQ pid=5663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.845000 audit[5663]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8336c000 a2=3 a3=0 items=0 ppid=1 pid=5663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:07.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:07.846735 sshd[5663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:07.852886 systemd[1]: Started session-22.scope. Feb 9 19:08:07.853494 systemd-logind[1303]: New session 22 of user core. Feb 9 19:08:07.857000 audit[5663]: USER_START pid=5663 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:07.859000 audit[5665]: CRED_ACQ pid=5665 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:08.369946 sshd[5663]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:08.371000 audit[5663]: USER_END pid=5663 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:08.371000 audit[5663]: CRED_DISP pid=5663 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:08.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.31:22-10.200.12.6:42624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:08.373391 systemd[1]: sshd@19-10.200.8.31:22-10.200.12.6:42624.service: Deactivated successfully. Feb 9 19:08:08.374576 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:08:08.375926 systemd-logind[1303]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:08:08.376891 systemd-logind[1303]: Removed session 22. Feb 9 19:08:11.616887 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 9 19:08:11.617067 kernel: audit: type=1325 audit(1707505691.610:1603): table=filter:140 family=2 entries=20 op=nft_register_rule pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.610000 audit[5677]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.628869 kernel: audit: type=1300 audit(1707505691.610:1603): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe3ac07c10 a2=0 a3=7ffe3ac07bfc items=0 ppid=2638 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.610000 audit[5677]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe3ac07c10 a2=0 a3=7ffe3ac07bfc items=0 ppid=2638 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.655927 kernel: audit: type=1327 audit(1707505691.610:1603): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:11.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:11.610000 audit[5677]: NETFILTER_CFG table=nat:141 family=2 entries=106 op=nft_register_chain pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.669276 kernel: audit: type=1325 audit(1707505691.610:1604): table=nat:141 family=2 entries=106 op=nft_register_chain pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:08:11.610000 audit[5677]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffe3ac07c10 a2=0 a3=7ffe3ac07bfc items=0 ppid=2638 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:11.701529 kernel: audit: type=1300 audit(1707505691.610:1604): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffe3ac07c10 a2=0 a3=7ffe3ac07bfc items=0 ppid=2638 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:11.701691 kernel: audit: type=1327 audit(1707505691.610:1604): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:08:13.477911 systemd[1]: Started sshd@20-10.200.8.31:22-10.200.12.6:42630.service. Feb 9 19:08:13.503219 kernel: audit: type=1130 audit(1707505693.476:1605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.31:22-10.200.12.6:42630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:13.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.31:22-10.200.12.6:42630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:14.137000 audit[5680]: USER_ACCT pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.159947 kernel: audit: type=1101 audit(1707505694.137:1606): pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.160006 sshd[5680]: Accepted publickey for core from 10.200.12.6 port 42630 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:14.160581 sshd[5680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:14.158000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.166728 systemd[1]: Started session-23.scope. Feb 9 19:08:14.168008 systemd-logind[1303]: New session 23 of user core. Feb 9 19:08:14.182944 kernel: audit: type=1103 audit(1707505694.158:1607): pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.158000 audit[5680]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff001d5cc0 a2=3 a3=0 items=0 ppid=1 pid=5680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:14.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:14.172000 audit[5680]: USER_START pid=5680 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.182000 audit[5684]: CRED_ACQ pid=5684 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.196120 kernel: audit: type=1006 audit(1707505694.158:1608): pid=5680 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:08:14.637481 sshd[5680]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:14.637000 audit[5680]: USER_END pid=5680 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.637000 audit[5680]: CRED_DISP pid=5680 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:14.640984 systemd[1]: sshd@20-10.200.8.31:22-10.200.12.6:42630.service: Deactivated successfully. Feb 9 19:08:14.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.31:22-10.200.12.6:42630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:14.642049 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:08:14.642803 systemd-logind[1303]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:08:14.643659 systemd-logind[1303]: Removed session 23. Feb 9 19:08:19.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.31:22-10.200.12.6:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:19.745557 systemd[1]: Started sshd@21-10.200.8.31:22-10.200.12.6:48532.service. Feb 9 19:08:19.769055 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:08:19.769211 kernel: audit: type=1130 audit(1707505699.744:1614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.31:22-10.200.12.6:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:20.370000 audit[5697]: USER_ACCT pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.376369 sshd[5697]: Accepted publickey for core from 10.200.12.6 port 48532 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:20.396884 kernel: audit: type=1101 audit(1707505700.370:1615): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.397321 sshd[5697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:20.394000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.403633 systemd[1]: Started session-24.scope. Feb 9 19:08:20.404636 systemd-logind[1303]: New session 24 of user core. Feb 9 19:08:20.417864 kernel: audit: type=1103 audit(1707505700.394:1616): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.431124 kernel: audit: type=1006 audit(1707505700.394:1617): pid=5697 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:08:20.431245 kernel: audit: type=1300 audit(1707505700.394:1617): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff040c3600 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:20.394000 audit[5697]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff040c3600 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:20.394000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:20.456836 kernel: audit: type=1327 audit(1707505700.394:1617): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:20.456977 kernel: audit: type=1105 audit(1707505700.408:1618): pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.408000 audit[5697]: USER_START pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.417000 audit[5704]: CRED_ACQ pid=5704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.497418 kernel: audit: type=1103 audit(1707505700.417:1619): pid=5704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.880515 sshd[5697]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:20.880000 audit[5697]: USER_END pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.884653 systemd-logind[1303]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:08:20.885962 systemd[1]: sshd@21-10.200.8.31:22-10.200.12.6:48532.service: Deactivated successfully. Feb 9 19:08:20.886838 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:08:20.888185 systemd-logind[1303]: Removed session 24. Feb 9 19:08:20.880000 audit[5697]: CRED_DISP pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.920611 kernel: audit: type=1106 audit(1707505700.880:1620): pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.920771 kernel: audit: type=1104 audit(1707505700.880:1621): pid=5697 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:20.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.31:22-10.200.12.6:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:21.112609 systemd[1]: run-containerd-runc-k8s.io-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8-runc.uQVT3L.mount: Deactivated successfully. Feb 9 19:08:25.989397 systemd[1]: Started sshd@22-10.200.8.31:22-10.200.12.6:48546.service. Feb 9 19:08:25.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.31:22-10.200.12.6:48546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:25.995325 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:08:25.995432 kernel: audit: type=1130 audit(1707505705.988:1623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.31:22-10.200.12.6:48546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:26.616000 audit[5737]: USER_ACCT pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.645071 kernel: audit: type=1101 audit(1707505706.616:1624): pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.621146 sshd[5737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:26.645543 sshd[5737]: Accepted publickey for core from 10.200.12.6 port 48546 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:26.616000 audit[5737]: CRED_ACQ pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.653190 systemd[1]: Started session-25.scope. Feb 9 19:08:26.654488 systemd-logind[1303]: New session 25 of user core. Feb 9 19:08:26.666179 kernel: audit: type=1103 audit(1707505706.616:1625): pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.666299 kernel: audit: type=1006 audit(1707505706.616:1626): pid=5737 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:08:26.616000 audit[5737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5f82e10 a2=3 a3=0 items=0 ppid=1 pid=5737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:26.693575 kernel: audit: type=1300 audit(1707505706.616:1626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5f82e10 a2=3 a3=0 items=0 ppid=1 pid=5737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:26.693721 kernel: audit: type=1327 audit(1707505706.616:1626): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:26.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:26.661000 audit[5737]: USER_START pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.717759 kernel: audit: type=1105 audit(1707505706.661:1627): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.666000 audit[5739]: CRED_ACQ pid=5739 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:26.737937 kernel: audit: type=1103 audit(1707505706.666:1628): pid=5739 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:27.120016 sshd[5737]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:27.121000 audit[5737]: USER_END pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:27.124408 systemd[1]: sshd@22-10.200.8.31:22-10.200.12.6:48546.service: Deactivated successfully. Feb 9 19:08:27.125496 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:08:27.127208 systemd-logind[1303]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:08:27.128172 systemd-logind[1303]: Removed session 25. Feb 9 19:08:27.149876 kernel: audit: type=1106 audit(1707505707.121:1629): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:27.150040 kernel: audit: type=1104 audit(1707505707.121:1630): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:27.121000 audit[5737]: CRED_DISP pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:27.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.31:22-10.200.12.6:48546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:27.374219 systemd[1]: run-containerd-runc-k8s.io-03e3565ed13310dddff1556ec86e0a8cbab5527b7d963bb85d034594ceff9434-runc.DViaBA.mount: Deactivated successfully. Feb 9 19:08:27.407310 systemd[1]: run-containerd-runc-k8s.io-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789-runc.acb0Dk.mount: Deactivated successfully. Feb 9 19:08:32.249929 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:08:32.250084 kernel: audit: type=1130 audit(1707505712.225:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.31:22-10.200.12.6:46162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:32.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.31:22-10.200.12.6:46162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:32.226009 systemd[1]: Started sshd@23-10.200.8.31:22-10.200.12.6:46162.service. Feb 9 19:08:32.844000 audit[5808]: USER_ACCT pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.864498 sshd[5808]: Accepted publickey for core from 10.200.12.6 port 46162 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:32.864889 kernel: audit: type=1101 audit(1707505712.844:1633): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.864801 sshd[5808]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:32.863000 audit[5808]: CRED_ACQ pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.879992 systemd[1]: Started session-26.scope. Feb 9 19:08:32.880894 systemd-logind[1303]: New session 26 of user core. Feb 9 19:08:32.895091 kernel: audit: type=1103 audit(1707505712.863:1634): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.895225 kernel: audit: type=1006 audit(1707505712.863:1635): pid=5808 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:08:32.863000 audit[5808]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe085e9600 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:32.913702 kernel: audit: type=1300 audit(1707505712.863:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe085e9600 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:32.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:32.887000 audit[5808]: USER_START pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.940089 kernel: audit: type=1327 audit(1707505712.863:1635): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:32.940231 kernel: audit: type=1105 audit(1707505712.887:1636): pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.940270 kernel: audit: type=1103 audit(1707505712.889:1637): pid=5810 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:32.889000 audit[5810]: CRED_ACQ pid=5810 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:33.362134 sshd[5808]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:33.362000 audit[5808]: USER_END pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:33.365364 systemd[1]: sshd@23-10.200.8.31:22-10.200.12.6:46162.service: Deactivated successfully. Feb 9 19:08:33.366294 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:08:33.373854 systemd-logind[1303]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:08:33.374747 systemd-logind[1303]: Removed session 26. Feb 9 19:08:33.392893 kernel: audit: type=1106 audit(1707505713.362:1638): pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:33.393052 kernel: audit: type=1104 audit(1707505713.362:1639): pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:33.362000 audit[5808]: CRED_DISP pid=5808 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:33.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.31:22-10.200.12.6:46162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:34.616029 systemd[1]: run-containerd-runc-k8s.io-7b76ac453d9582b27d4e9c141e93816ef19efa9964304c2ee3fee61e76785596-runc.wXDKMd.mount: Deactivated successfully. Feb 9 19:08:38.468180 systemd[1]: Started sshd@24-10.200.8.31:22-10.200.12.6:35992.service. Feb 9 19:08:38.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.31:22-10.200.12.6:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:38.482405 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:08:38.482508 kernel: audit: type=1130 audit(1707505718.467:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.31:22-10.200.12.6:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:39.194000 audit[5839]: USER_ACCT pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.217974 kernel: audit: type=1101 audit(1707505719.194:1642): pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.218042 sshd[5839]: Accepted publickey for core from 10.200.12.6 port 35992 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:39.218631 sshd[5839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:39.217000 audit[5839]: CRED_ACQ pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.229010 systemd[1]: Started session-27.scope. Feb 9 19:08:39.229896 systemd-logind[1303]: New session 27 of user core. Feb 9 19:08:39.238037 kernel: audit: type=1103 audit(1707505719.217:1643): pid=5839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.250884 kernel: audit: type=1006 audit(1707505719.217:1644): pid=5839 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:08:39.251049 kernel: audit: type=1300 audit(1707505719.217:1644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec12646f0 a2=3 a3=0 items=0 ppid=1 pid=5839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.217000 audit[5839]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec12646f0 a2=3 a3=0 items=0 ppid=1 pid=5839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:39.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:39.269911 kernel: audit: type=1327 audit(1707505719.217:1644): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:39.234000 audit[5839]: USER_START pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.294761 kernel: audit: type=1105 audit(1707505719.234:1645): pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.238000 audit[5842]: CRED_ACQ pid=5842 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.311871 kernel: audit: type=1103 audit(1707505719.238:1646): pid=5842 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.696223 sshd[5839]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:39.698000 audit[5839]: USER_END pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.710215 systemd[1]: sshd@24-10.200.8.31:22-10.200.12.6:35992.service: Deactivated successfully. Feb 9 19:08:39.712235 systemd-logind[1303]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:08:39.698000 audit[5839]: CRED_DISP pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.724888 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:08:39.726496 systemd-logind[1303]: Removed session 27. Feb 9 19:08:39.741374 kernel: audit: type=1106 audit(1707505719.698:1647): pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.741537 kernel: audit: type=1104 audit(1707505719.698:1648): pid=5839 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:39.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.31:22-10.200.12.6:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:42.378000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.378000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00299a180 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:42.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:42.379000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.379000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fc2330 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:42.379000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:42.806000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.806000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.806000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0021272f0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:42.806000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.806000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c002127380 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:42.806000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ea220e0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:42.817000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.817000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.817000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f4cd8c0 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:42.817000 audit[2286]: AVC avc: denied { watch } for pid=2286 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:42.817000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c002127f20 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:42.817000 audit[2286]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c000ed3290 a2=fc6 a3=0 items=0 ppid=2145 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c813 key=(null) Feb 9 19:08:42.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:08:44.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.31:22-10.200.12.6:36002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:44.801455 systemd[1]: Started sshd@25-10.200.8.31:22-10.200.12.6:36002.service. Feb 9 19:08:44.825195 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:08:44.825401 kernel: audit: type=1130 audit(1707505724.800:1658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.31:22-10.200.12.6:36002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:45.426000 audit[5853]: USER_ACCT pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.427804 sshd[5853]: Accepted publickey for core from 10.200.12.6 port 36002 ssh2: RSA SHA256:YgPjskTM3AVkF+tJg78MDL6wtNgbOF8Unod2GMujbXg Feb 9 19:08:45.449471 kernel: audit: type=1101 audit(1707505725.426:1659): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.449375 sshd[5853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:08:45.447000 audit[5853]: CRED_ACQ pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.459591 systemd[1]: Started session-28.scope. Feb 9 19:08:45.461157 systemd-logind[1303]: New session 28 of user core. Feb 9 19:08:45.469941 kernel: audit: type=1103 audit(1707505725.447:1660): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.470063 kernel: audit: type=1006 audit(1707505725.447:1661): pid=5853 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 19:08:45.447000 audit[5853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecc485610 a2=3 a3=0 items=0 ppid=1 pid=5853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:45.481867 kernel: audit: type=1300 audit(1707505725.447:1661): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecc485610 a2=3 a3=0 items=0 ppid=1 pid=5853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:08:45.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:45.499873 kernel: audit: type=1327 audit(1707505725.447:1661): proctitle=737368643A20636F7265205B707269765D Feb 9 19:08:45.464000 audit[5853]: USER_START pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.523759 kernel: audit: type=1105 audit(1707505725.464:1662): pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.464000 audit[5855]: CRED_ACQ pid=5855 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.542878 kernel: audit: type=1103 audit(1707505725.464:1663): pid=5855 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.923756 sshd[5853]: pam_unix(sshd:session): session closed for user core Feb 9 19:08:45.924000 audit[5853]: USER_END pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.927433 systemd-logind[1303]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:08:45.928829 systemd[1]: sshd@25-10.200.8.31:22-10.200.12.6:36002.service: Deactivated successfully. Feb 9 19:08:45.929733 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:08:45.931128 systemd-logind[1303]: Removed session 28. Feb 9 19:08:45.947872 kernel: audit: type=1106 audit(1707505725.924:1664): pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.948021 kernel: audit: type=1104 audit(1707505725.924:1665): pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.924000 audit[5853]: CRED_DISP pid=5853 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:08:45.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.31:22-10.200.12.6:36002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:08:51.112441 systemd[1]: run-containerd-runc-k8s.io-7487754cd79540dab6b1eacea9c86aa37cb1666de529c68426f8122a00fbc4f8-runc.15yGIF.mount: Deactivated successfully. Feb 9 19:08:57.409401 systemd[1]: run-containerd-runc-k8s.io-58b2457faa557b8f14b27f3927171f4a2ad493417b8127967edaaff7d7381789-runc.iJm91C.mount: Deactivated successfully. Feb 9 19:08:57.434467 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:08:57.434612 kernel: audit: type=1400 audit(1707505737.423:1667): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.423000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.447965 kernel: audit: type=1400 audit(1707505737.428:1668): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.428000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.428000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00299bb40 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.493059 kernel: audit: type=1300 audit(1707505737.428:1668): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00299bb40 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.428000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.528967 kernel: audit: type=1327 audit(1707505737.428:1668): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.529129 kernel: audit: type=1400 audit(1707505737.428:1669): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.529162 kernel: audit: type=1300 audit(1707505737.428:1669): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00299bc60 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.428000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00299bc60 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.579596 kernel: audit: type=1327 audit(1707505737.428:1669): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.579748 kernel: audit: type=1300 audit(1707505737.423:1667): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028ea740 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.423000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028ea740 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.423000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.622038 kernel: audit: type=1327 audit(1707505737.423:1667): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:08:57.622217 kernel: audit: type=1400 audit(1707505737.433:1670): avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.433000 audit[2344]: AVC avc: denied { watch } for pid=2344 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:08:57.433000 audit[2344]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028ea760 a2=fc6 a3=0 items=0 ppid=2171 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:08:57.433000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:09:00.141931 systemd[1]: cri-containerd-2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f.scope: Deactivated successfully. Feb 9 19:09:00.142282 systemd[1]: cri-containerd-2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f.scope: Consumed 4.131s CPU time. Feb 9 19:09:00.145000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:09:00.145000 audit: BPF prog-id=103 op=UNLOAD Feb 9 19:09:00.179158 env[1319]: time="2024-02-09T19:09:00.170682778Z" level=info msg="shim disconnected" id=2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f Feb 9 19:09:00.179158 env[1319]: time="2024-02-09T19:09:00.170762278Z" level=warning msg="cleaning up after shim disconnected" id=2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f namespace=k8s.io Feb 9 19:09:00.179158 env[1319]: time="2024-02-09T19:09:00.170776478Z" level=info msg="cleaning up dead shim" Feb 9 19:09:00.176647 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f-rootfs.mount: Deactivated successfully. Feb 9 19:09:00.182687 env[1319]: time="2024-02-09T19:09:00.182645275Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:09:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5977 runtime=io.containerd.runc.v2\n" Feb 9 19:09:00.792960 systemd[1]: cri-containerd-291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809.scope: Deactivated successfully. Feb 9 19:09:00.793296 systemd[1]: cri-containerd-291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809.scope: Consumed 6.063s CPU time. Feb 9 19:09:00.792000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:09:00.796000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:09:00.818232 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809-rootfs.mount: Deactivated successfully. Feb 9 19:09:00.819617 env[1319]: time="2024-02-09T19:09:00.819562267Z" level=info msg="shim disconnected" id=291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809 Feb 9 19:09:00.819818 env[1319]: time="2024-02-09T19:09:00.819622568Z" level=warning msg="cleaning up after shim disconnected" id=291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809 namespace=k8s.io Feb 9 19:09:00.819818 env[1319]: time="2024-02-09T19:09:00.819636768Z" level=info msg="cleaning up dead shim" Feb 9 19:09:00.828602 env[1319]: time="2024-02-09T19:09:00.828553140Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:09:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6002 runtime=io.containerd.runc.v2\n" Feb 9 19:09:00.864457 kubelet[2464]: I0209 19:09:00.864423 2464 scope.go:117] "RemoveContainer" containerID="291f3f452467c1dffc23dfdbf8675f8e1191aaf386fa704000379a04440da809" Feb 9 19:09:00.866729 env[1319]: time="2024-02-09T19:09:00.866627251Z" level=info msg="CreateContainer within sandbox \"54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 19:09:00.867039 kubelet[2464]: I0209 19:09:00.867017 2464 scope.go:117] "RemoveContainer" containerID="2f318d3f795644f158d9eba610204b367dee3cfddebce25c63db0338b44c4b2f" Feb 9 19:09:00.869632 env[1319]: time="2024-02-09T19:09:00.869582075Z" level=info msg="CreateContainer within sandbox \"8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 19:09:00.896462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2152267264.mount: Deactivated successfully. Feb 9 19:09:00.919187 env[1319]: time="2024-02-09T19:09:00.919132379Z" level=info msg="CreateContainer within sandbox \"54a565ec82b124f7ed7301bef8f70b9ffdf3ec32363b0e5f2e2366dee1059bfc\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"7ad5d29f3fa255e8f5002a780d6633c090089ae67dd33d00ad08cf2fdccd3489\"" Feb 9 19:09:00.919764 env[1319]: time="2024-02-09T19:09:00.919725284Z" level=info msg="StartContainer for \"7ad5d29f3fa255e8f5002a780d6633c090089ae67dd33d00ad08cf2fdccd3489\"" Feb 9 19:09:00.926068 env[1319]: time="2024-02-09T19:09:00.925998935Z" level=info msg="CreateContainer within sandbox \"8f2376b6248e5bcedbc49af6b1a4124451084503898983d6473b7b43a051be78\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"136c4ef7f4d4e37a55e564249ab6448d8ee8192183d81b783ce44dcbc5560ee0\"" Feb 9 19:09:00.927083 env[1319]: time="2024-02-09T19:09:00.927047643Z" level=info msg="StartContainer for \"136c4ef7f4d4e37a55e564249ab6448d8ee8192183d81b783ce44dcbc5560ee0\"" Feb 9 19:09:00.953015 systemd[1]: Started cri-containerd-136c4ef7f4d4e37a55e564249ab6448d8ee8192183d81b783ce44dcbc5560ee0.scope. Feb 9 19:09:00.966539 systemd[1]: Started cri-containerd-7ad5d29f3fa255e8f5002a780d6633c090089ae67dd33d00ad08cf2fdccd3489.scope. Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.984000 audit: BPF prog-id=212 op=LOAD Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2593 pid=6030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643564323966336661323535653866353030326137383064363633 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2593 pid=6030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643564323966336661323535653866353030326137383064363633 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit: BPF prog-id=213 op=LOAD Feb 9 19:09:00.985000 audit[6030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000311e90 items=0 ppid=2593 pid=6030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643564323966336661323535653866353030326137383064363633 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit: BPF prog-id=214 op=LOAD Feb 9 19:09:00.985000 audit[6030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000311ed8 items=0 ppid=2593 pid=6030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643564323966336661323535653866353030326137383064363633 Feb 9 19:09:00.985000 audit: BPF prog-id=214 op=UNLOAD Feb 9 19:09:00.985000 audit: BPF prog-id=213 op=UNLOAD Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { perfmon } for pid=6030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit[6030]: AVC avc: denied { bpf } for pid=6030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.985000 audit: BPF prog-id=215 op=LOAD Feb 9 19:09:00.985000 audit[6030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00036e2e8 items=0 ppid=2593 pid=6030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643564323966336661323535653866353030326137383064363633 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.987000 audit: BPF prog-id=216 op=LOAD Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2171 pid=6031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366334656637663464346533376135356535363432343961623634 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2171 pid=6031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366334656637663464346533376135356535363432343961623634 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit: BPF prog-id=217 op=LOAD Feb 9 19:09:00.988000 audit[6031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003959c0 items=0 ppid=2171 pid=6031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366334656637663464346533376135356535363432343961623634 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit: BPF prog-id=218 op=LOAD Feb 9 19:09:00.988000 audit[6031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000395a08 items=0 ppid=2171 pid=6031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366334656637663464346533376135356535363432343961623634 Feb 9 19:09:00.988000 audit: BPF prog-id=218 op=UNLOAD Feb 9 19:09:00.988000 audit: BPF prog-id=217 op=UNLOAD Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { perfmon } for pid=6031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit[6031]: AVC avc: denied { bpf } for pid=6031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:00.988000 audit: BPF prog-id=219 op=LOAD Feb 9 19:09:00.988000 audit[6031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000395e18 items=0 ppid=2171 pid=6031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:00.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366334656637663464346533376135356535363432343961623634 Feb 9 19:09:01.025318 env[1319]: time="2024-02-09T19:09:01.025261243Z" level=info msg="StartContainer for \"7ad5d29f3fa255e8f5002a780d6633c090089ae67dd33d00ad08cf2fdccd3489\" returns successfully" Feb 9 19:09:01.039860 env[1319]: time="2024-02-09T19:09:01.039782061Z" level=info msg="StartContainer for \"136c4ef7f4d4e37a55e564249ab6448d8ee8192183d81b783ce44dcbc5560ee0\" returns successfully" Feb 9 19:09:01.686017 kubelet[2464]: E0209 19:09:01.685860 2464 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-dbdb6b501f.17b2476a730b33fb", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-dbdb6b501f", UID:"7cfa8cbc5a89c7e91e10ef92d66c05c2", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-dbdb6b501f"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 8, 51, 249058811, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 8, 51, 249058811, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-dbdb6b501f"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.31:40668->10.200.8.16:2379: read: connection timed out' (will not retry!) Feb 9 19:09:02.045000 audit[6051]: AVC avc: denied { watch } for pid=6051 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:09:02.045000 audit[6051]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001cc1e0 a2=fc6 a3=0 items=0 ppid=2171 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:09:02.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:09:02.046000 audit[6051]: AVC avc: denied { watch } for pid=6051 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:09:02.046000 audit[6051]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007e8e60 a2=fc6 a3=0 items=0 ppid=2171 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c796,c850 key=(null) Feb 9 19:09:02.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:09:02.072521 kubelet[2464]: E0209 19:09:02.072487 2464 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.31:40868->10.200.8.16:2379: read: connection timed out" Feb 9 19:09:02.073651 systemd[1]: cri-containerd-d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85.scope: Deactivated successfully. Feb 9 19:09:02.074000 systemd[1]: cri-containerd-d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85.scope: Consumed 1.485s CPU time. Feb 9 19:09:02.076000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:09:02.076000 audit: BPF prog-id=106 op=UNLOAD Feb 9 19:09:02.101043 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85-rootfs.mount: Deactivated successfully. Feb 9 19:09:02.103240 env[1319]: time="2024-02-09T19:09:02.103187995Z" level=info msg="shim disconnected" id=d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85 Feb 9 19:09:02.103699 env[1319]: time="2024-02-09T19:09:02.103676899Z" level=warning msg="cleaning up after shim disconnected" id=d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85 namespace=k8s.io Feb 9 19:09:02.103792 env[1319]: time="2024-02-09T19:09:02.103778600Z" level=info msg="cleaning up dead shim" Feb 9 19:09:02.112824 env[1319]: time="2024-02-09T19:09:02.112775873Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:09:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6100 runtime=io.containerd.runc.v2\n" Feb 9 19:09:02.879194 kubelet[2464]: I0209 19:09:02.878835 2464 scope.go:117] "RemoveContainer" containerID="d764d787e28c525f5710f32142a2b076c28e691cdbb64a70088d694ce1473f85" Feb 9 19:09:02.880761 env[1319]: time="2024-02-09T19:09:02.880715188Z" level=info msg="CreateContainer within sandbox \"a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 19:09:02.883000 audit[5030]: AVC avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:09:02.891583 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 9 19:09:02.891694 kernel: audit: type=1400 audit(1707505742.883:1715): avc: denied { watch } for pid=5030 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.3693137673/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c419,c449 tclass=file permissive=0 Feb 9 19:09:02.922073 kernel: audit: type=1300 audit(1707505742.883:1715): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005cd8a0 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:09:02.883000 audit[5030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005cd8a0 a2=fc6 a3=0 items=0 ppid=4942 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c419,c449 key=(null) Feb 9 19:09:02.923926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount815074094.mount: Deactivated successfully. Feb 9 19:09:02.883000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:09:02.960294 kernel: audit: type=1327 audit(1707505742.883:1715): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:09:02.970780 env[1319]: time="2024-02-09T19:09:02.970712817Z" level=info msg="CreateContainer within sandbox \"a87ef00158ad7c7e0b91a3087411d14d10978b6ac1e35e2b200d26ce943ea517\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"a8c637d4893bfa24c69136f61e67b4161caf05ce329b671de4ecb9c724143efa\"" Feb 9 19:09:02.971440 env[1319]: time="2024-02-09T19:09:02.971403022Z" level=info msg="StartContainer for \"a8c637d4893bfa24c69136f61e67b4161caf05ce329b671de4ecb9c724143efa\"" Feb 9 19:09:02.996427 systemd[1]: Started cri-containerd-a8c637d4893bfa24c69136f61e67b4161caf05ce329b671de4ecb9c724143efa.scope. Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.041890 kernel: audit: type=1400 audit(1707505743.014:1716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.042074 kernel: audit: type=1400 audit(1707505743.014:1717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056800 kernel: audit: type=1400 audit(1707505743.014:1718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.071966 kernel: audit: type=1400 audit(1707505743.014:1719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.089888 kernel: audit: type=1400 audit(1707505743.014:1720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.090043 kernel: audit: type=1400 audit(1707505743.014:1721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.112147 kernel: audit: type=1400 audit(1707505743.014:1722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.041000 audit: BPF prog-id=220 op=LOAD Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2200 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:03.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633633376434383933626661323463363931333666363165363762 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2200 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:03.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633633376434383933626661323463363931333666363165363762 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.044000 audit: BPF prog-id=221 op=LOAD Feb 9 19:09:03.044000 audit[6120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002302b0 items=0 ppid=2200 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:03.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633633376434383933626661323463363931333666363165363762 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit: BPF prog-id=222 op=LOAD Feb 9 19:09:03.056000 audit[6120]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002302f8 items=0 ppid=2200 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:03.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633633376434383933626661323463363931333666363165363762 Feb 9 19:09:03.056000 audit: BPF prog-id=222 op=UNLOAD Feb 9 19:09:03.056000 audit: BPF prog-id=221 op=UNLOAD Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { perfmon } for pid=6120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit[6120]: AVC avc: denied { bpf } for pid=6120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:09:03.056000 audit: BPF prog-id=223 op=LOAD Feb 9 19:09:03.056000 audit[6120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000230708 items=0 ppid=2200 pid=6120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:09:03.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633633376434383933626661323463363931333666363165363762 Feb 9 19:09:03.148272 env[1319]: time="2024-02-09T19:09:03.148147548Z" level=info msg="StartContainer for \"a8c637d4893bfa24c69136f61e67b4161caf05ce329b671de4ecb9c724143efa\" returns successfully" Feb 9 19:09:03.393000 audit[5068]: AVC avc: denied { watch } for pid=5068 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_05_57.272684834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c675 tclass=file permissive=0 Feb 9 19:09:03.393000 audit[5068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020ec0c0 a2=fc6 a3=0 items=0 ppid=4910 pid=5068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c675 key=(null) Feb 9 19:09:03.393000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:09:09.749221 kubelet[2464]: I0209 19:09:09.749097 2464 status_manager.go:853] "Failed to get status for pod" podUID="7cfa8cbc5a89c7e91e10ef92d66c05c2" pod="kube-system/kube-apiserver-ci-3510.3.2-a-dbdb6b501f" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.31:40772->10.200.8.16:2379: read: connection timed out" Feb 9 19:09:12.074431 kubelet[2464]: E0209 19:09:12.074384 2464 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.31:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-dbdb6b501f?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"