Feb 9 09:54:10.105025 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 09:54:10.105044 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 09:54:10.105052 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 09:54:10.105059 kernel: printk: bootconsole [pl11] enabled Feb 9 09:54:10.105065 kernel: efi: EFI v2.70 by EDK II Feb 9 09:54:10.105070 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 09:54:10.105076 kernel: random: crng init done Feb 9 09:54:10.105082 kernel: ACPI: Early table checksum verification disabled Feb 9 09:54:10.105087 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 09:54:10.105093 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105098 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105104 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 09:54:10.105110 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105115 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105122 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105128 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105133 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105140 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105146 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 09:54:10.105152 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:10.105157 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 09:54:10.105163 kernel: NUMA: Failed to initialise from firmware Feb 9 09:54:10.105169 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:54:10.105175 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 09:54:10.105181 kernel: Zone ranges: Feb 9 09:54:10.105186 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 09:54:10.105192 kernel: DMA32 empty Feb 9 09:54:10.105199 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:54:10.105204 kernel: Movable zone start for each node Feb 9 09:54:10.105210 kernel: Early memory node ranges Feb 9 09:54:10.105216 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 09:54:10.105221 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 09:54:10.105227 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 09:54:10.105233 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 09:54:10.105238 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 09:54:10.105244 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 09:54:10.105249 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 09:54:10.105255 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 09:54:10.105261 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:54:10.105268 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:54:10.105276 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 09:54:10.105283 kernel: psci: probing for conduit method from ACPI. Feb 9 09:54:10.105289 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 09:54:10.105294 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 09:54:10.105302 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 09:54:10.105308 kernel: psci: SMC Calling Convention v1.4 Feb 9 09:54:10.105314 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 09:54:10.105319 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 09:54:10.105325 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 09:54:10.105331 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 09:54:10.105337 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 09:54:10.105343 kernel: Detected PIPT I-cache on CPU0 Feb 9 09:54:10.105349 kernel: CPU features: detected: GIC system register CPU interface Feb 9 09:54:10.105355 kernel: CPU features: detected: Hardware dirty bit management Feb 9 09:54:10.105361 kernel: CPU features: detected: Spectre-BHB Feb 9 09:54:10.105367 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 09:54:10.105375 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 09:54:10.105381 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 09:54:10.105386 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 09:54:10.105404 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 09:54:10.105410 kernel: Policy zone: Normal Feb 9 09:54:10.105417 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:54:10.105424 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:54:10.105430 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 09:54:10.105436 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:54:10.105442 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:54:10.105450 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 09:54:10.105457 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 09:54:10.105463 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:54:10.105469 kernel: trace event string verifier disabled Feb 9 09:54:10.105475 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 09:54:10.105481 kernel: rcu: RCU event tracing is enabled. Feb 9 09:54:10.105487 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:54:10.105494 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 09:54:10.105500 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:54:10.105506 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:54:10.105512 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:54:10.105519 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 09:54:10.105525 kernel: GICv3: 960 SPIs implemented Feb 9 09:54:10.105531 kernel: GICv3: 0 Extended SPIs implemented Feb 9 09:54:10.105537 kernel: GICv3: Distributor has no Range Selector support Feb 9 09:54:10.105543 kernel: Root IRQ handler: gic_handle_irq Feb 9 09:54:10.105548 kernel: GICv3: 16 PPIs implemented Feb 9 09:54:10.105554 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 09:54:10.105560 kernel: ITS: No ITS available, not enabling LPIs Feb 9 09:54:10.105567 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:54:10.105573 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 09:54:10.105579 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 09:54:10.105585 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 09:54:10.105592 kernel: Console: colour dummy device 80x25 Feb 9 09:54:10.105599 kernel: printk: console [tty1] enabled Feb 9 09:54:10.105605 kernel: ACPI: Core revision 20210730 Feb 9 09:54:10.105612 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 09:54:10.105618 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:54:10.105624 kernel: LSM: Security Framework initializing Feb 9 09:54:10.105630 kernel: SELinux: Initializing. Feb 9 09:54:10.105637 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:54:10.105643 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:54:10.105651 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 09:54:10.105657 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 09:54:10.105663 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:54:10.105669 kernel: Remapping and enabling EFI services. Feb 9 09:54:10.105675 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:54:10.105681 kernel: Detected PIPT I-cache on CPU1 Feb 9 09:54:10.105688 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 09:54:10.105694 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:54:10.105700 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 09:54:10.105708 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:54:10.105714 kernel: SMP: Total of 2 processors activated. Feb 9 09:54:10.105720 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 09:54:10.105727 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 09:54:10.105733 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 09:54:10.105739 kernel: CPU features: detected: CRC32 instructions Feb 9 09:54:10.105745 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 09:54:10.105751 kernel: CPU features: detected: LSE atomic instructions Feb 9 09:54:10.105758 kernel: CPU features: detected: Privileged Access Never Feb 9 09:54:10.105765 kernel: CPU: All CPU(s) started at EL1 Feb 9 09:54:10.105772 kernel: alternatives: patching kernel code Feb 9 09:54:10.105782 kernel: devtmpfs: initialized Feb 9 09:54:10.105791 kernel: KASLR enabled Feb 9 09:54:10.105797 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:54:10.105804 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:54:10.105810 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:54:10.105817 kernel: SMBIOS 3.1.0 present. Feb 9 09:54:10.105824 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 09:54:10.105830 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:54:10.105838 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 09:54:10.105845 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 09:54:10.105852 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 09:54:10.105858 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:54:10.105865 kernel: audit: type=2000 audit(0.096:1): state=initialized audit_enabled=0 res=1 Feb 9 09:54:10.105872 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:54:10.105878 kernel: cpuidle: using governor menu Feb 9 09:54:10.105886 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 09:54:10.105893 kernel: ASID allocator initialised with 32768 entries Feb 9 09:54:10.105899 kernel: ACPI: bus type PCI registered Feb 9 09:54:10.105906 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:54:10.105912 kernel: Serial: AMBA PL011 UART driver Feb 9 09:54:10.105919 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:54:10.105925 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 09:54:10.105932 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:54:10.105946 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 09:54:10.105954 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:54:10.105961 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 09:54:10.105967 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:54:10.105974 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:54:10.105980 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:54:10.105987 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:54:10.105993 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:54:10.106000 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:54:10.106006 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:54:10.106015 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:54:10.106021 kernel: ACPI: Interpreter enabled Feb 9 09:54:10.106028 kernel: ACPI: Using GIC for interrupt routing Feb 9 09:54:10.106034 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 09:54:10.106041 kernel: printk: console [ttyAMA0] enabled Feb 9 09:54:10.106047 kernel: printk: bootconsole [pl11] disabled Feb 9 09:54:10.106054 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 09:54:10.106060 kernel: iommu: Default domain type: Translated Feb 9 09:54:10.106067 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 09:54:10.106079 kernel: vgaarb: loaded Feb 9 09:54:10.106086 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:54:10.106093 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:54:10.106099 kernel: PTP clock support registered Feb 9 09:54:10.106106 kernel: Registered efivars operations Feb 9 09:54:10.106114 kernel: No ACPI PMU IRQ for CPU0 Feb 9 09:54:10.106126 kernel: No ACPI PMU IRQ for CPU1 Feb 9 09:54:10.106134 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 09:54:10.106141 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:54:10.106150 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:54:10.106158 kernel: pnp: PnP ACPI init Feb 9 09:54:10.106170 kernel: pnp: PnP ACPI: found 0 devices Feb 9 09:54:10.106178 kernel: NET: Registered PF_INET protocol family Feb 9 09:54:10.106186 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:54:10.106194 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 09:54:10.106201 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:54:10.106213 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:54:10.106220 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 09:54:10.106230 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 09:54:10.106238 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:54:10.106250 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:54:10.106258 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:54:10.106266 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:54:10.106273 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 09:54:10.106279 kernel: kvm [1]: HYP mode not available Feb 9 09:54:10.106286 kernel: Initialise system trusted keyrings Feb 9 09:54:10.106292 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 09:54:10.106301 kernel: Key type asymmetric registered Feb 9 09:54:10.106309 kernel: Asymmetric key parser 'x509' registered Feb 9 09:54:10.106321 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:54:10.106329 kernel: io scheduler mq-deadline registered Feb 9 09:54:10.106337 kernel: io scheduler kyber registered Feb 9 09:54:10.106344 kernel: io scheduler bfq registered Feb 9 09:54:10.106352 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:54:10.106359 kernel: thunder_xcv, ver 1.0 Feb 9 09:54:10.106367 kernel: thunder_bgx, ver 1.0 Feb 9 09:54:10.106376 kernel: nicpf, ver 1.0 Feb 9 09:54:10.106384 kernel: nicvf, ver 1.0 Feb 9 09:54:10.106543 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 09:54:10.106606 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T09:54:09 UTC (1707472449) Feb 9 09:54:10.106615 kernel: efifb: probing for efifb Feb 9 09:54:10.106622 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 09:54:10.106629 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 09:54:10.106635 kernel: efifb: scrolling: redraw Feb 9 09:54:10.106644 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 09:54:10.106651 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:54:10.106658 kernel: fb0: EFI VGA frame buffer device Feb 9 09:54:10.106664 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 09:54:10.106671 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:54:10.106677 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:54:10.106684 kernel: Segment Routing with IPv6 Feb 9 09:54:10.106690 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:54:10.106697 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:54:10.106705 kernel: Key type dns_resolver registered Feb 9 09:54:10.106711 kernel: registered taskstats version 1 Feb 9 09:54:10.106718 kernel: Loading compiled-in X.509 certificates Feb 9 09:54:10.106725 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 09:54:10.106731 kernel: Key type .fscrypt registered Feb 9 09:54:10.106738 kernel: Key type fscrypt-provisioning registered Feb 9 09:54:10.106744 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:54:10.106751 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:54:10.106757 kernel: ima: No architecture policies found Feb 9 09:54:10.106766 kernel: Freeing unused kernel memory: 34688K Feb 9 09:54:10.106772 kernel: Run /init as init process Feb 9 09:54:10.106779 kernel: with arguments: Feb 9 09:54:10.106785 kernel: /init Feb 9 09:54:10.106792 kernel: with environment: Feb 9 09:54:10.106798 kernel: HOME=/ Feb 9 09:54:10.106804 kernel: TERM=linux Feb 9 09:54:10.106811 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:54:10.106819 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:54:10.106829 systemd[1]: Detected virtualization microsoft. Feb 9 09:54:10.106837 systemd[1]: Detected architecture arm64. Feb 9 09:54:10.106844 systemd[1]: Running in initrd. Feb 9 09:54:10.106851 systemd[1]: No hostname configured, using default hostname. Feb 9 09:54:10.106857 systemd[1]: Hostname set to . Feb 9 09:54:10.106865 systemd[1]: Initializing machine ID from random generator. Feb 9 09:54:10.106872 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:54:10.106880 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:54:10.106887 systemd[1]: Reached target cryptsetup.target. Feb 9 09:54:10.106893 systemd[1]: Reached target paths.target. Feb 9 09:54:10.106900 systemd[1]: Reached target slices.target. Feb 9 09:54:10.106907 systemd[1]: Reached target swap.target. Feb 9 09:54:10.106914 systemd[1]: Reached target timers.target. Feb 9 09:54:10.106921 systemd[1]: Listening on iscsid.socket. Feb 9 09:54:10.106928 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:54:10.106937 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:54:10.106944 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:54:10.106951 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:54:10.106958 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:54:10.106965 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:54:10.106972 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:54:10.106979 systemd[1]: Reached target sockets.target. Feb 9 09:54:10.106987 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:54:10.106994 systemd[1]: Finished network-cleanup.service. Feb 9 09:54:10.107002 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:54:10.107009 systemd[1]: Starting systemd-journald.service... Feb 9 09:54:10.107017 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:54:10.107024 systemd[1]: Starting systemd-resolved.service... Feb 9 09:54:10.107034 systemd-journald[276]: Journal started Feb 9 09:54:10.107070 systemd-journald[276]: Runtime Journal (/run/log/journal/f7e83f789f844d4a99c8c836b78f3332) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:54:10.089580 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 09:54:10.134405 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:54:10.134445 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:54:10.145018 systemd-resolved[278]: Positive Trust Anchors: Feb 9 09:54:10.163714 kernel: Bridge firewalling registered Feb 9 09:54:10.163734 systemd[1]: Started systemd-journald.service. Feb 9 09:54:10.145032 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:54:10.205275 kernel: SCSI subsystem initialized Feb 9 09:54:10.205298 kernel: audit: type=1130 audit(1707472450.175:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.145060 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:54:10.280309 kernel: audit: type=1130 audit(1707472450.210:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.280335 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:54:10.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.145214 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 09:54:10.332352 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:54:10.332374 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:54:10.332383 kernel: audit: type=1130 audit(1707472450.298:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.356734 kernel: audit: type=1130 audit(1707472450.325:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.147114 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 09:54:10.389116 kernel: audit: type=1130 audit(1707472450.355:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.205190 systemd[1]: Started systemd-resolved.service. Feb 9 09:54:10.419557 kernel: audit: type=1130 audit(1707472450.381:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.211146 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:54:10.299347 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:54:10.305475 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 09:54:10.326588 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:54:10.356277 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:54:10.381283 systemd[1]: Reached target nss-lookup.target. Feb 9 09:54:10.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.414508 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:54:10.427144 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:54:10.542538 kernel: audit: type=1130 audit(1707472450.475:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.542561 kernel: audit: type=1130 audit(1707472450.508:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.445349 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:54:10.574861 kernel: audit: type=1130 audit(1707472450.537:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.470434 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:54:10.476175 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:54:10.585449 dracut-cmdline[299]: dracut-dracut-053 Feb 9 09:54:10.585449 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:54:10.508895 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:54:10.538991 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:54:10.648409 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:54:10.660523 kernel: iscsi: registered transport (tcp) Feb 9 09:54:10.680893 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:54:10.680906 kernel: QLogic iSCSI HBA Driver Feb 9 09:54:10.716196 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:54:10.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.722576 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:54:10.780432 kernel: raid6: neonx8 gen() 13804 MB/s Feb 9 09:54:10.798412 kernel: raid6: neonx8 xor() 10843 MB/s Feb 9 09:54:10.820412 kernel: raid6: neonx4 gen() 13494 MB/s Feb 9 09:54:10.848408 kernel: raid6: neonx4 xor() 11340 MB/s Feb 9 09:54:10.869404 kernel: raid6: neonx2 gen() 12960 MB/s Feb 9 09:54:10.890403 kernel: raid6: neonx2 xor() 10297 MB/s Feb 9 09:54:10.913407 kernel: raid6: neonx1 gen() 10489 MB/s Feb 9 09:54:10.934403 kernel: raid6: neonx1 xor() 8821 MB/s Feb 9 09:54:10.955404 kernel: raid6: int64x8 gen() 6281 MB/s Feb 9 09:54:10.977405 kernel: raid6: int64x8 xor() 3546 MB/s Feb 9 09:54:10.998403 kernel: raid6: int64x4 gen() 7223 MB/s Feb 9 09:54:11.019403 kernel: raid6: int64x4 xor() 3852 MB/s Feb 9 09:54:11.041404 kernel: raid6: int64x2 gen() 6150 MB/s Feb 9 09:54:11.062403 kernel: raid6: int64x2 xor() 3320 MB/s Feb 9 09:54:11.082403 kernel: raid6: int64x1 gen() 5041 MB/s Feb 9 09:54:11.108006 kernel: raid6: int64x1 xor() 2644 MB/s Feb 9 09:54:11.108016 kernel: raid6: using algorithm neonx8 gen() 13804 MB/s Feb 9 09:54:11.108024 kernel: raid6: .... xor() 10843 MB/s, rmw enabled Feb 9 09:54:11.112433 kernel: raid6: using neon recovery algorithm Feb 9 09:54:11.135625 kernel: xor: measuring software checksum speed Feb 9 09:54:11.135639 kernel: 8regs : 17297 MB/sec Feb 9 09:54:11.140167 kernel: 32regs : 20755 MB/sec Feb 9 09:54:11.150383 kernel: arm64_neon : 28045 MB/sec Feb 9 09:54:11.150401 kernel: xor: using function: arm64_neon (28045 MB/sec) Feb 9 09:54:11.207412 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 09:54:11.218002 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:54:11.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.230000 audit: BPF prog-id=7 op=LOAD Feb 9 09:54:11.230000 audit: BPF prog-id=8 op=LOAD Feb 9 09:54:11.231135 systemd[1]: Starting systemd-udevd.service... Feb 9 09:54:11.251217 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 09:54:11.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.258219 systemd[1]: Started systemd-udevd.service. Feb 9 09:54:11.270327 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:54:11.285880 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 09:54:11.316059 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:54:11.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.322917 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:54:11.367939 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:54:11.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.427412 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 09:54:11.452422 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 09:54:11.452466 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 09:54:11.452476 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 09:54:11.452485 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 09:54:11.479921 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 09:54:11.479992 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 09:54:11.489754 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 09:54:11.489916 kernel: scsi host1: storvsc_host_t Feb 9 09:54:11.497820 kernel: scsi host0: storvsc_host_t Feb 9 09:54:11.505491 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 09:54:11.513241 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 09:54:11.533946 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 09:54:11.534151 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 09:54:11.535417 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 09:54:11.551734 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 09:54:11.551935 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 09:54:11.556894 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 09:54:11.565131 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 09:54:11.565264 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 09:54:11.572424 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:54:11.581090 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 09:54:11.620422 kernel: hv_netvsc 000d3ac4-42fa-000d-3ac4-42fa000d3ac4 eth0: VF slot 1 added Feb 9 09:54:11.629420 kernel: hv_vmbus: registering driver hv_pci Feb 9 09:54:11.642866 kernel: hv_pci 77ff5100-fe35-45c8-b329-50acd521fb58: PCI VMBus probing: Using version 0x10004 Feb 9 09:54:11.658288 kernel: hv_pci 77ff5100-fe35-45c8-b329-50acd521fb58: PCI host bridge to bus fe35:00 Feb 9 09:54:11.658461 kernel: pci_bus fe35:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 09:54:11.665866 kernel: pci_bus fe35:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 09:54:11.675996 kernel: pci fe35:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 09:54:11.693506 kernel: pci fe35:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:54:11.716450 kernel: pci fe35:00:02.0: enabling Extended Tags Feb 9 09:54:11.739525 kernel: pci fe35:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at fe35:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 09:54:11.755674 kernel: pci_bus fe35:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 09:54:11.755864 kernel: pci fe35:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:54:11.797414 kernel: mlx5_core fe35:00:02.0: firmware version: 16.30.1284 Feb 9 09:54:12.063415 kernel: mlx5_core fe35:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 09:54:12.059033 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:54:12.094413 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (533) Feb 9 09:54:12.109137 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:54:12.149633 kernel: hv_netvsc 000d3ac4-42fa-000d-3ac4-42fa000d3ac4 eth0: VF registering: eth1 Feb 9 09:54:12.149831 kernel: mlx5_core fe35:00:02.0 eth1: joined to eth0 Feb 9 09:54:12.164420 kernel: mlx5_core fe35:00:02.0 enP65077s1: renamed from eth1 Feb 9 09:54:12.268431 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:54:12.275064 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:54:12.290260 systemd[1]: Starting disk-uuid.service... Feb 9 09:54:12.323713 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:54:12.338555 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:54:13.329413 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:54:13.329950 disk-uuid[601]: The operation has completed successfully. Feb 9 09:54:13.387040 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:54:13.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.387124 systemd[1]: Finished disk-uuid.service. Feb 9 09:54:13.400815 systemd[1]: Starting verity-setup.service... Feb 9 09:54:13.455448 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 09:54:13.733024 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:54:13.739715 systemd[1]: Finished verity-setup.service. Feb 9 09:54:13.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.751654 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:54:13.816624 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:54:13.817037 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:54:13.821571 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:54:13.822316 systemd[1]: Starting ignition-setup.service... Feb 9 09:54:13.830012 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:54:13.874589 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:13.874642 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:13.880332 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:13.927790 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:54:13.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.939000 audit: BPF prog-id=9 op=LOAD Feb 9 09:54:13.940061 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:13.958918 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:54:13.971074 systemd-networkd[845]: lo: Link UP Feb 9 09:54:13.971087 systemd-networkd[845]: lo: Gained carrier Feb 9 09:54:14.019239 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 09:54:14.019266 kernel: audit: type=1130 audit(1707472453.980:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.971495 systemd-networkd[845]: Enumeration completed Feb 9 09:54:13.971574 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:14.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.980426 systemd-networkd[845]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:14.065825 kernel: audit: type=1130 audit(1707472454.028:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.065848 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:14.065848 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 09:54:14.065848 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:54:14.065848 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:54:14.065848 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:54:14.065848 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:14.065848 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:54:14.297127 kernel: audit: type=1130 audit(1707472454.070:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.297156 kernel: mlx5_core fe35:00:02.0 enP65077s1: Link up Feb 9 09:54:14.297318 kernel: audit: type=1130 audit(1707472454.143:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.297329 kernel: hv_netvsc 000d3ac4-42fa-000d-3ac4-42fa000d3ac4 eth0: Data path switched to VF: enP65077s1 Feb 9 09:54:14.297425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:54:14.297443 kernel: audit: type=1130 audit(1707472454.265:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.981062 systemd[1]: Reached target network.target. Feb 9 09:54:14.015266 systemd[1]: Starting iscsiuio.service... Feb 9 09:54:14.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.019567 systemd[1]: Started iscsiuio.service. Feb 9 09:54:14.345423 kernel: audit: type=1130 audit(1707472454.303:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:14.029698 systemd[1]: Starting iscsid.service... Feb 9 09:54:14.056410 systemd[1]: Started iscsid.service. Feb 9 09:54:14.071730 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:54:14.136128 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:54:14.143539 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:54:14.209426 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:54:14.215975 systemd-networkd[845]: enP65077s1: Link UP Feb 9 09:54:14.216054 systemd-networkd[845]: eth0: Link UP Feb 9 09:54:14.216170 systemd-networkd[845]: eth0: Gained carrier Feb 9 09:54:14.216614 systemd[1]: Reached target remote-fs.target. Feb 9 09:54:14.230293 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:54:14.237762 systemd-networkd[845]: enP65077s1: Gained carrier Feb 9 09:54:14.259044 systemd-networkd[845]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:54:14.260277 systemd[1]: Finished ignition-setup.service. Feb 9 09:54:14.266573 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:54:14.304514 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:54:16.269523 systemd-networkd[845]: eth0: Gained IPv6LL Feb 9 09:54:17.383276 ignition[869]: Ignition 2.14.0 Feb 9 09:54:17.383288 ignition[869]: Stage: fetch-offline Feb 9 09:54:17.383348 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:17.383372 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:17.473997 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:17.474137 ignition[869]: parsed url from cmdline: "" Feb 9 09:54:17.474140 ignition[869]: no config URL provided Feb 9 09:54:17.474146 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:54:17.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.481589 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:54:17.530290 kernel: audit: type=1130 audit(1707472457.491:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.474153 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:54:17.492685 systemd[1]: Starting ignition-fetch.service... Feb 9 09:54:17.474159 ignition[869]: failed to fetch config: resource requires networking Feb 9 09:54:17.474470 ignition[869]: Ignition finished successfully Feb 9 09:54:17.511437 ignition[875]: Ignition 2.14.0 Feb 9 09:54:17.511443 ignition[875]: Stage: fetch Feb 9 09:54:17.511550 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:17.511574 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:17.514562 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:17.518989 ignition[875]: parsed url from cmdline: "" Feb 9 09:54:17.519006 ignition[875]: no config URL provided Feb 9 09:54:17.519015 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:54:17.519033 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:54:17.519066 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 09:54:17.635658 ignition[875]: GET result: OK Feb 9 09:54:17.635823 ignition[875]: config has been read from IMDS userdata Feb 9 09:54:17.635897 ignition[875]: parsing config with SHA512: d514d949a81ef7d2a9b4809787f1a7020f363680b796e9ad17ecbb5d737eb05bd1552d5b5c0b649d37df1379f01c817c33461f91aab256d0a958119b96f3b2c0 Feb 9 09:54:17.669883 unknown[875]: fetched base config from "system" Feb 9 09:54:17.669897 unknown[875]: fetched base config from "system" Feb 9 09:54:17.670512 ignition[875]: fetch: fetch complete Feb 9 09:54:17.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.669902 unknown[875]: fetched user config from "azure" Feb 9 09:54:17.670517 ignition[875]: fetch: fetch passed Feb 9 09:54:17.731712 kernel: audit: type=1130 audit(1707472457.686:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.678487 systemd[1]: Finished ignition-fetch.service. Feb 9 09:54:17.670561 ignition[875]: Ignition finished successfully Feb 9 09:54:17.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.715342 systemd[1]: Starting ignition-kargs.service... Feb 9 09:54:17.727844 ignition[881]: Ignition 2.14.0 Feb 9 09:54:17.783650 kernel: audit: type=1130 audit(1707472457.742:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.736980 systemd[1]: Finished ignition-kargs.service. Feb 9 09:54:17.727850 ignition[881]: Stage: kargs Feb 9 09:54:17.769173 systemd[1]: Starting ignition-disks.service... Feb 9 09:54:17.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.727957 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:17.792995 systemd[1]: Finished ignition-disks.service. Feb 9 09:54:17.727979 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:17.799149 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:54:17.864125 kernel: audit: type=1130 audit(1707472457.798:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.730662 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:17.834722 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:54:17.733014 ignition[881]: kargs: kargs passed Feb 9 09:54:17.847898 systemd[1]: Reached target local-fs.target. Feb 9 09:54:17.733066 ignition[881]: Ignition finished successfully Feb 9 09:54:17.858528 systemd[1]: Reached target sysinit.target. Feb 9 09:54:17.782309 ignition[887]: Ignition 2.14.0 Feb 9 09:54:17.869536 systemd[1]: Reached target basic.target. Feb 9 09:54:17.782317 ignition[887]: Stage: disks Feb 9 09:54:17.889698 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:54:17.782525 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:17.782563 ignition[887]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:17.786442 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:17.789836 ignition[887]: disks: disks passed Feb 9 09:54:17.789896 ignition[887]: Ignition finished successfully Feb 9 09:54:18.007331 systemd-fsck[895]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 09:54:18.023217 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:54:18.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:18.030723 systemd[1]: Mounting sysroot.mount... Feb 9 09:54:18.066436 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:54:18.066867 systemd[1]: Mounted sysroot.mount. Feb 9 09:54:18.073806 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:54:18.125728 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:54:18.131317 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:54:18.142691 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:54:18.142723 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:54:18.150631 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:54:18.207516 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:18.213942 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:54:18.248337 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:54:18.276102 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) Feb 9 09:54:18.276125 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:18.276134 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:18.276143 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:18.279713 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:18.293468 initrd-setup-root[937]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:54:18.304758 initrd-setup-root[945]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:54:18.316151 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:54:18.778197 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:54:18.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:18.785230 systemd[1]: Starting ignition-mount.service... Feb 9 09:54:18.794884 systemd[1]: Starting sysroot-boot.service... Feb 9 09:54:18.809092 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:18.809188 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:18.843135 ignition[973]: INFO : Ignition 2.14.0 Feb 9 09:54:18.843135 ignition[973]: INFO : Stage: mount Feb 9 09:54:18.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:18.850075 systemd[1]: Finished ignition-mount.service. Feb 9 09:54:18.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:18.869731 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:18.869731 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:18.869731 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:18.869731 ignition[973]: INFO : mount: mount passed Feb 9 09:54:18.869731 ignition[973]: INFO : Ignition finished successfully Feb 9 09:54:18.858777 systemd[1]: Finished sysroot-boot.service. Feb 9 09:54:19.567541 coreos-metadata[905]: Feb 09 09:54:19.567 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 09:54:19.579679 coreos-metadata[905]: Feb 09 09:54:19.579 INFO Fetch successful Feb 9 09:54:19.612740 coreos-metadata[905]: Feb 09 09:54:19.612 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 09:54:19.641359 coreos-metadata[905]: Feb 09 09:54:19.641 INFO Fetch successful Feb 9 09:54:19.658187 coreos-metadata[905]: Feb 09 09:54:19.658 INFO wrote hostname ci-3510.3.2-a-08b227d6a8 to /sysroot/etc/hostname Feb 9 09:54:19.669142 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:54:19.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:19.676419 systemd[1]: Starting ignition-files.service... Feb 9 09:54:19.717684 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 09:54:19.717708 kernel: audit: type=1130 audit(1707472459.675:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:19.718466 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:19.752647 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Feb 9 09:54:19.752701 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:19.758557 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:19.764514 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:19.769331 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:19.788367 ignition[1004]: INFO : Ignition 2.14.0 Feb 9 09:54:19.788367 ignition[1004]: INFO : Stage: files Feb 9 09:54:19.801301 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:19.801301 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:19.801301 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:19.801301 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:54:19.843154 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:54:19.843154 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:54:19.926520 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:54:19.937537 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:54:19.954746 unknown[1004]: wrote ssh authorized keys file for user: core Feb 9 09:54:19.961687 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:54:19.971156 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:54:19.985783 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 09:54:20.312184 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:54:20.462111 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 09:54:20.483321 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:54:20.483321 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:54:20.483321 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 09:54:20.624508 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:54:20.957370 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:54:20.973549 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:54:20.973549 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 09:54:21.232196 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:54:21.514694 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 09:54:21.533782 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:54:21.533782 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:21.533782 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Feb 9 09:54:21.763410 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:54:22.052278 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Feb 9 09:54:22.069477 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:22.069477 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:22.069477 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 9 09:54:22.113820 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 09:54:22.389751 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 9 09:54:22.407807 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:22.407807 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:22.407807 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 9 09:54:22.448928 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 09:54:23.074756 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 9 09:54:23.096805 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:23.096805 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:23.096805 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:23.096805 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:23.154699 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1006) Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2422727470" Feb 9 09:54:23.154726 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2422727470": device or resource busy Feb 9 09:54:23.154726 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2422727470", trying btrfs: device or resource busy Feb 9 09:54:23.154726 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2422727470" Feb 9 09:54:23.361510 kernel: audit: type=1130 audit(1707472463.236:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.155698 systemd[1]: mnt-oem2422727470.mount: Deactivated successfully. Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2422727470" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2422727470" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2422727470" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985966949" Feb 9 09:54:23.367613 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985966949": device or resource busy Feb 9 09:54:23.367613 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2985966949", trying btrfs: device or resource busy Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985966949" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985966949" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2985966949" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2985966949" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 09:54:23.367613 ignition[1004]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 09:54:23.202206 systemd[1]: mnt-oem2985966949.mount: Deactivated successfully. Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1d): [started] processing unit "prepare-critools.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1d): [finished] processing unit "prepare-critools.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:23.562895 ignition[1004]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:23.792434 kernel: audit: type=1130 audit(1707472463.713:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.792462 kernel: audit: type=1131 audit(1707472463.738:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:23.214142 systemd[1]: Finished ignition-files.service. Feb 9 09:54:23.798559 ignition[1004]: INFO : files: op(22): [started] setting preset to enabled for "waagent.service" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: op(22): [finished] setting preset to enabled for "waagent.service" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: op(23): [started] setting preset to enabled for "nvidia.service" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: op(23): [finished] setting preset to enabled for "nvidia.service" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:23.798559 ignition[1004]: INFO : files: files passed Feb 9 09:54:23.798559 ignition[1004]: INFO : Ignition finished successfully Feb 9 09:54:23.265733 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:54:23.292124 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:54:23.302990 systemd[1]: Starting ignition-quench.service... Feb 9 09:54:23.698967 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:54:23.699083 systemd[1]: Finished ignition-quench.service. Feb 9 09:54:24.057363 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:54:24.066605 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:54:24.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.073095 systemd[1]: Reached target ignition-complete.target. Feb 9 09:54:24.106797 kernel: audit: type=1130 audit(1707472464.072:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.103246 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:54:24.124417 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:54:24.124515 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:54:24.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.134765 systemd[1]: Reached target initrd-fs.target. Feb 9 09:54:24.184532 kernel: audit: type=1130 audit(1707472464.134:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.184558 kernel: audit: type=1131 audit(1707472464.134:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.179775 systemd[1]: Reached target initrd.target. Feb 9 09:54:24.189634 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:54:24.195719 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:54:24.220196 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:54:24.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.252369 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:54:24.264646 kernel: audit: type=1130 audit(1707472464.225:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.266771 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:54:24.272432 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:54:24.282425 systemd[1]: Stopped target timers.target. Feb 9 09:54:24.292321 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:54:24.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.292459 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:54:24.337577 kernel: audit: type=1131 audit(1707472464.301:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.302098 systemd[1]: Stopped target initrd.target. Feb 9 09:54:24.333141 systemd[1]: Stopped target basic.target. Feb 9 09:54:24.342137 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:54:24.352362 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:54:24.361920 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:54:24.373129 systemd[1]: Stopped target remote-fs.target. Feb 9 09:54:24.383308 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:54:24.393518 systemd[1]: Stopped target sysinit.target. Feb 9 09:54:24.403259 systemd[1]: Stopped target local-fs.target. Feb 9 09:54:24.413508 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:54:24.422864 systemd[1]: Stopped target swap.target. Feb 9 09:54:24.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.432813 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:54:24.480642 kernel: audit: type=1131 audit(1707472464.443:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.432920 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:54:24.474308 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:54:24.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.486058 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:54:24.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.486165 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:54:24.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.497564 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:54:24.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.497660 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:54:24.509686 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:54:24.509770 systemd[1]: Stopped ignition-files.service. Feb 9 09:54:24.571727 ignition[1042]: INFO : Ignition 2.14.0 Feb 9 09:54:24.571727 ignition[1042]: INFO : Stage: umount Feb 9 09:54:24.571727 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:24.571727 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:24.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.521293 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:54:24.634810 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:24.634810 ignition[1042]: INFO : umount: umount passed Feb 9 09:54:24.634810 ignition[1042]: INFO : Ignition finished successfully Feb 9 09:54:24.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.521379 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:54:24.542612 systemd[1]: Stopping ignition-mount.service... Feb 9 09:54:24.727084 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 09:54:24.727108 kernel: audit: type=1131 audit(1707472464.690:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.556581 systemd[1]: Stopping iscsiuio.service... Feb 9 09:54:24.581636 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:54:24.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.581861 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:54:24.593760 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:54:24.605527 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:54:24.811842 kernel: audit: type=1131 audit(1707472464.736:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.811864 kernel: audit: type=1131 audit(1707472464.783:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.605709 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:54:24.611601 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:54:24.611732 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:54:24.650439 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:54:24.650544 systemd[1]: Stopped iscsiuio.service. Feb 9 09:54:24.656416 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:54:24.656496 systemd[1]: Stopped ignition-mount.service. Feb 9 09:54:24.667546 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:54:24.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.667648 systemd[1]: Stopped ignition-disks.service. Feb 9 09:54:24.679023 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:54:24.930168 kernel: audit: type=1131 audit(1707472464.883:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.679070 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:54:24.690650 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:54:24.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.690700 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:54:24.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.763519 systemd[1]: Stopped target network.target. Feb 9 09:54:25.021807 kernel: audit: type=1130 audit(1707472464.945:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.021837 kernel: audit: type=1131 audit(1707472464.970:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.021847 kernel: audit: type=1131 audit(1707472464.999:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.772787 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:54:24.772846 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:54:25.061249 kernel: audit: type=1131 audit(1707472465.035:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.783456 systemd[1]: Stopped target paths.target. Feb 9 09:54:24.817090 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:54:25.120682 kernel: audit: type=1131 audit(1707472465.065:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.120714 kernel: audit: type=1334 audit(1707472465.065:66): prog-id=6 op=UNLOAD Feb 9 09:54:25.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.065000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:54:24.826424 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:54:25.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.834698 systemd[1]: Stopped target slices.target. Feb 9 09:54:24.844375 systemd[1]: Stopped target sockets.target. Feb 9 09:54:24.854473 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:54:25.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.854505 systemd[1]: Closed iscsid.socket. Feb 9 09:54:25.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.862400 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:54:25.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.862438 systemd[1]: Closed iscsiuio.socket. Feb 9 09:54:24.872894 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:54:25.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.872937 systemd[1]: Stopped ignition-setup.service. Feb 9 09:54:24.910754 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:54:24.921080 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:54:24.936504 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:54:25.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.937177 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:54:25.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.937268 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:54:25.266010 kernel: hv_netvsc 000d3ac4-42fa-000d-3ac4-42fa000d3ac4 eth0: Data path switched from VF: enP65077s1 Feb 9 09:54:25.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:24.945351 systemd-networkd[845]: eth0: DHCPv6 lease lost Feb 9 09:54:25.265000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:54:24.972433 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:54:24.972530 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:54:25.000739 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:54:25.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.024698 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:54:25.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.036517 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:54:25.036604 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:54:25.067290 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:54:25.067328 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:54:25.098374 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:54:25.098480 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:54:25.131181 systemd[1]: Stopping network-cleanup.service... Feb 9 09:54:25.141285 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:54:25.141362 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:54:25.153381 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:54:25.154194 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:54:25.166150 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:54:25.166196 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:54:25.171904 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:54:25.183163 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:54:25.183657 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:54:25.183774 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:54:25.196644 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:54:25.196703 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:54:25.209732 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:54:25.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:25.209774 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:54:25.220614 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:54:25.220661 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:54:25.229967 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:54:25.230007 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:54:25.240132 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:54:25.480332 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Feb 9 09:54:25.480366 iscsid[854]: iscsid shutting down. Feb 9 09:54:25.240168 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:54:25.265445 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:54:25.282669 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:54:25.282744 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:54:25.293493 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:54:25.293592 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:54:25.408228 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:54:25.408356 systemd[1]: Stopped network-cleanup.service. Feb 9 09:54:25.417794 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:54:25.429878 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:54:25.448548 systemd[1]: Switching root. Feb 9 09:54:25.480761 systemd-journald[276]: Journal stopped Feb 9 09:54:37.864086 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:54:37.864105 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:54:37.864116 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:54:37.864126 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:54:37.864134 kernel: SELinux: policy capability open_perms=1 Feb 9 09:54:37.864142 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:54:37.864152 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:54:37.864160 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:54:37.864168 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:54:37.864177 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:54:37.864187 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:54:37.864196 systemd[1]: Successfully loaded SELinux policy in 283.049ms. Feb 9 09:54:37.872180 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.958ms. Feb 9 09:54:37.872195 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:54:37.872212 systemd[1]: Detected virtualization microsoft. Feb 9 09:54:37.872222 systemd[1]: Detected architecture arm64. Feb 9 09:54:37.872232 systemd[1]: Detected first boot. Feb 9 09:54:37.872242 systemd[1]: Hostname set to . Feb 9 09:54:37.872252 systemd[1]: Initializing machine ID from random generator. Feb 9 09:54:37.872262 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:54:37.872271 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 09:54:37.872281 kernel: audit: type=1400 audit(1707472470.069:87): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:54:37.872294 kernel: audit: type=1300 audit(1707472470.069:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227f2 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:37.872305 kernel: audit: type=1327 audit(1707472470.069:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:37.872314 kernel: audit: type=1400 audit(1707472470.079:88): avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:54:37.872324 kernel: audit: type=1300 audit(1707472470.079:88): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228c9 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:37.872334 kernel: audit: type=1307 audit(1707472470.079:88): cwd="/" Feb 9 09:54:37.872344 kernel: audit: type=1302 audit(1707472470.079:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:37.872354 kernel: audit: type=1302 audit(1707472470.079:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:37.872364 kernel: audit: type=1327 audit(1707472470.079:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:37.872373 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:54:37.872384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:54:37.872411 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:54:37.872423 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:54:37.872435 kernel: audit: type=1334 audit(1707472477.075:89): prog-id=12 op=LOAD Feb 9 09:54:37.872444 kernel: audit: type=1334 audit(1707472477.075:90): prog-id=3 op=UNLOAD Feb 9 09:54:37.872453 kernel: audit: type=1334 audit(1707472477.082:91): prog-id=13 op=LOAD Feb 9 09:54:37.872461 kernel: audit: type=1334 audit(1707472477.089:92): prog-id=14 op=LOAD Feb 9 09:54:37.872470 kernel: audit: type=1334 audit(1707472477.089:93): prog-id=4 op=UNLOAD Feb 9 09:54:37.872479 kernel: audit: type=1334 audit(1707472477.089:94): prog-id=5 op=UNLOAD Feb 9 09:54:37.872490 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:54:37.872500 kernel: audit: type=1334 audit(1707472477.097:95): prog-id=15 op=LOAD Feb 9 09:54:37.872510 kernel: audit: type=1334 audit(1707472477.097:96): prog-id=12 op=UNLOAD Feb 9 09:54:37.872520 systemd[1]: Stopped iscsid.service. Feb 9 09:54:37.872530 kernel: audit: type=1334 audit(1707472477.103:97): prog-id=16 op=LOAD Feb 9 09:54:37.872539 kernel: audit: type=1334 audit(1707472477.109:98): prog-id=17 op=LOAD Feb 9 09:54:37.872549 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:54:37.872558 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:54:37.872568 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:54:37.872580 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:54:37.872590 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:54:37.872599 systemd[1]: Created slice system-getty.slice. Feb 9 09:54:37.872609 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:54:37.872621 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:54:37.872631 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:54:37.872641 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:54:37.872651 systemd[1]: Created slice user.slice. Feb 9 09:54:37.872661 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:54:37.872672 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:54:37.872682 systemd[1]: Set up automount boot.automount. Feb 9 09:54:37.872692 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:54:37.872701 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:54:37.872711 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:54:37.872721 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:54:37.872732 systemd[1]: Reached target integritysetup.target. Feb 9 09:54:37.872741 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:54:37.872753 systemd[1]: Reached target remote-fs.target. Feb 9 09:54:37.872762 systemd[1]: Reached target slices.target. Feb 9 09:54:37.872772 systemd[1]: Reached target swap.target. Feb 9 09:54:37.872782 systemd[1]: Reached target torcx.target. Feb 9 09:54:37.872792 systemd[1]: Reached target veritysetup.target. Feb 9 09:54:37.872801 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:54:37.872813 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:54:37.872823 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:54:37.872834 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:54:37.872844 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:54:37.872854 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:54:37.872864 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:54:37.872875 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:54:37.872885 systemd[1]: Mounting media.mount... Feb 9 09:54:37.872896 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:54:37.872906 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:54:37.872916 systemd[1]: Mounting tmp.mount... Feb 9 09:54:37.872926 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:54:37.872936 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:54:37.872946 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:54:37.872956 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:54:37.872966 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:54:37.872976 systemd[1]: Starting modprobe@drm.service... Feb 9 09:54:37.872987 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:54:37.872997 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:54:37.873007 systemd[1]: Starting modprobe@loop.service... Feb 9 09:54:37.873017 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:54:37.873027 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:54:37.873037 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:54:37.873048 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:54:37.873058 kernel: loop: module loaded Feb 9 09:54:37.873069 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:54:37.873079 systemd[1]: Stopped systemd-journald.service. Feb 9 09:54:37.873089 systemd[1]: systemd-journald.service: Consumed 4.141s CPU time. Feb 9 09:54:37.873098 kernel: fuse: init (API version 7.34) Feb 9 09:54:37.873107 systemd[1]: Starting systemd-journald.service... Feb 9 09:54:37.873117 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:54:37.873127 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:54:37.873137 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:54:37.873147 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:54:37.873159 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:54:37.873169 systemd[1]: Stopped verity-setup.service. Feb 9 09:54:37.873178 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:54:37.873192 systemd-journald[1181]: Journal started Feb 9 09:54:37.873249 systemd-journald[1181]: Runtime Journal (/run/log/journal/01a172740e1d4487a2b67fc60f489271) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:54:27.862000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:54:28.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:28.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:28.676000 audit: BPF prog-id=10 op=LOAD Feb 9 09:54:28.676000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:54:28.676000 audit: BPF prog-id=11 op=LOAD Feb 9 09:54:28.676000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:54:30.069000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:54:30.069000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227f2 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:30.069000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:30.079000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:54:30.079000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228c9 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:30.079000 audit: CWD cwd="/" Feb 9 09:54:30.079000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.079000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.079000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:37.075000 audit: BPF prog-id=12 op=LOAD Feb 9 09:54:37.075000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:54:37.082000 audit: BPF prog-id=13 op=LOAD Feb 9 09:54:37.089000 audit: BPF prog-id=14 op=LOAD Feb 9 09:54:37.089000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:54:37.089000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:54:37.097000 audit: BPF prog-id=15 op=LOAD Feb 9 09:54:37.097000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:54:37.103000 audit: BPF prog-id=16 op=LOAD Feb 9 09:54:37.109000 audit: BPF prog-id=17 op=LOAD Feb 9 09:54:37.109000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:54:37.109000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:54:37.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.141000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:54:37.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.772000 audit: BPF prog-id=18 op=LOAD Feb 9 09:54:37.773000 audit: BPF prog-id=19 op=LOAD Feb 9 09:54:37.773000 audit: BPF prog-id=20 op=LOAD Feb 9 09:54:37.773000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:54:37.773000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:54:37.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.861000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:54:37.861000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffffff92b80 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:37.861000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:54:30.019408 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:54:37.074297 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:54:30.049886 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:54:37.110638 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:54:30.049910 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:37.111008 systemd[1]: systemd-journald.service: Consumed 4.141s CPU time. Feb 9 09:54:30.049949 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:54:30.049959 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:54:30.049998 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:54:30.050010 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:54:30.050200 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:54:30.050231 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:54:30.050243 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:30.050636 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:54:30.050667 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:54:30.050685 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:54:30.050700 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:54:30.050716 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:54:30.050729 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:54:36.081726 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:36.081986 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:36.082079 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:36.082229 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:36.082297 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:54:36.082358 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T09:54:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:54:37.885464 systemd[1]: Started systemd-journald.service. Feb 9 09:54:37.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.886303 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:54:37.891485 systemd[1]: Mounted media.mount. Feb 9 09:54:37.896412 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:54:37.902274 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:54:37.907872 systemd[1]: Mounted tmp.mount. Feb 9 09:54:37.912006 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:54:37.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.917495 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:54:37.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.922993 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:54:37.923116 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:54:37.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.928387 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:54:37.928519 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:54:37.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.933866 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:54:37.933983 systemd[1]: Finished modprobe@drm.service. Feb 9 09:54:37.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.939807 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:54:37.939922 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:54:37.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.946196 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:54:37.946417 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:54:37.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.952599 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:54:37.952714 systemd[1]: Finished modprobe@loop.service. Feb 9 09:54:37.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.958819 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:54:37.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.965491 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:54:37.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.972163 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:54:37.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.978435 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:54:37.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:37.985024 systemd[1]: Reached target network-pre.target. Feb 9 09:54:37.991824 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:54:37.998639 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:54:38.003564 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:54:38.017964 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:54:38.023901 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:54:38.029250 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:54:38.030333 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:54:38.035324 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:54:38.036373 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:54:38.042631 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:54:38.048549 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:54:38.055514 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:54:38.061454 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:54:38.067511 systemd-journald[1181]: Time spent on flushing to /var/log/journal/01a172740e1d4487a2b67fc60f489271 is 15.555ms for 1140 entries. Feb 9 09:54:38.067511 systemd-journald[1181]: System Journal (/var/log/journal/01a172740e1d4487a2b67fc60f489271) is 8.0M, max 2.6G, 2.6G free. Feb 9 09:54:38.141994 systemd-journald[1181]: Received client request to flush runtime journal. Feb 9 09:54:38.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:38.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:38.094956 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:54:38.142248 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 09:54:38.100494 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:54:38.131883 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:54:38.142926 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:54:38.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:38.577815 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:54:38.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:39.174412 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:54:39.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:39.179000 audit: BPF prog-id=21 op=LOAD Feb 9 09:54:39.179000 audit: BPF prog-id=22 op=LOAD Feb 9 09:54:39.179000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:54:39.179000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:54:39.180919 systemd[1]: Starting systemd-udevd.service... Feb 9 09:54:39.199369 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 9 09:54:39.382741 systemd[1]: Started systemd-udevd.service. Feb 9 09:54:39.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:39.392000 audit: BPF prog-id=23 op=LOAD Feb 9 09:54:39.393755 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:39.421087 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 09:54:39.487000 audit: BPF prog-id=24 op=LOAD Feb 9 09:54:39.487000 audit: BPF prog-id=25 op=LOAD Feb 9 09:54:39.487000 audit: BPF prog-id=26 op=LOAD Feb 9 09:54:39.489013 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:54:39.509000 audit[1200]: AVC avc: denied { confidentiality } for pid=1200 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:54:39.545794 kernel: hv_vmbus: registering driver hv_balloon Feb 9 09:54:39.545877 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:54:39.545893 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 09:54:39.545907 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 09:54:39.545920 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 09:54:39.545934 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 09:54:39.545969 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 09:54:39.561528 kernel: Console: switching to colour dummy device 80x25 Feb 9 09:54:39.579195 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 09:54:39.579281 kernel: hv_vmbus: registering driver hv_utils Feb 9 09:54:39.579297 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:54:39.579311 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 09:54:39.585451 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 09:54:39.588307 systemd[1]: Started systemd-userdbd.service. Feb 9 09:54:39.599489 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 09:54:39.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:39.509000 audit[1200]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafab083e0 a1=aa2c a2=ffffae4724b0 a3=aaaafaa3e010 items=12 ppid=1198 pid=1200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:39.509000 audit: CWD cwd="/" Feb 9 09:54:39.509000 audit: PATH item=0 name=(null) inode=6449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=1 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=2 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=3 name=(null) inode=11515 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=4 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=5 name=(null) inode=11516 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=6 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=7 name=(null) inode=11517 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=8 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=9 name=(null) inode=11518 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=10 name=(null) inode=11514 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PATH item=11 name=(null) inode=11519 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:39.509000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:54:40.099585 systemd-networkd[1219]: lo: Link UP Feb 9 09:54:40.099596 systemd-networkd[1219]: lo: Gained carrier Feb 9 09:54:40.100017 systemd-networkd[1219]: Enumeration completed Feb 9 09:54:40.100123 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:40.120356 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1218) Feb 9 09:54:40.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.131423 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:54:40.137566 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:40.142720 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:54:40.149591 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:54:40.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.157200 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:54:40.199336 kernel: mlx5_core fe35:00:02.0 enP65077s1: Link up Feb 9 09:54:40.227366 kernel: hv_netvsc 000d3ac4-42fa-000d-3ac4-42fa000d3ac4 eth0: Data path switched to VF: enP65077s1 Feb 9 09:54:40.227923 systemd-networkd[1219]: enP65077s1: Link UP Feb 9 09:54:40.228139 systemd-networkd[1219]: eth0: Link UP Feb 9 09:54:40.228200 systemd-networkd[1219]: eth0: Gained carrier Feb 9 09:54:40.235539 systemd-networkd[1219]: enP65077s1: Gained carrier Feb 9 09:54:40.243423 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:54:40.471573 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:54:40.515200 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:54:40.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.520832 systemd[1]: Reached target cryptsetup.target. Feb 9 09:54:40.527434 systemd[1]: Starting lvm2-activation.service... Feb 9 09:54:40.531877 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:54:40.559285 systemd[1]: Finished lvm2-activation.service. Feb 9 09:54:40.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:40.564332 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:54:40.569806 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:54:40.569833 systemd[1]: Reached target local-fs.target. Feb 9 09:54:40.575415 systemd[1]: Reached target machines.target. Feb 9 09:54:40.581609 systemd[1]: Starting ldconfig.service... Feb 9 09:54:40.586230 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:54:40.586297 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:40.587519 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:54:40.594283 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:54:40.603068 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:54:40.610705 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:54:40.610770 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:54:40.611979 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:54:40.644298 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1280 (bootctl) Feb 9 09:54:40.645671 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:54:40.657899 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:54:40.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.358097 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:54:41.358732 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:54:41.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.373286 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:54:41.413709 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) Feb 9 09:54:41.413709 systemd-fsck[1288]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 09:54:41.415368 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:54:41.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.423728 systemd[1]: Mounting boot.mount... Feb 9 09:54:41.441189 systemd[1]: Mounted boot.mount. Feb 9 09:54:41.454847 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:54:41.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:41.481995 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:54:41.563116 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:54:42.051136 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:54:42.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.057689 systemd[1]: Starting audit-rules.service... Feb 9 09:54:42.062895 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:54:42.069225 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:54:42.073000 audit: BPF prog-id=27 op=LOAD Feb 9 09:54:42.076145 systemd[1]: Starting systemd-resolved.service... Feb 9 09:54:42.080000 audit: BPF prog-id=28 op=LOAD Feb 9 09:54:42.082581 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:54:42.087780 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:54:42.142000 audit[1300]: SYSTEM_BOOT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.146289 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:54:42.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.152532 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:54:42.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.158736 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:54:42.187529 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:54:42.192514 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 09:54:42.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.193059 systemd[1]: Reached target time-set.target. Feb 9 09:54:42.200133 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:54:42.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.245391 systemd-resolved[1297]: Positive Trust Anchors: Feb 9 09:54:42.245403 systemd-resolved[1297]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:54:42.245429 systemd-resolved[1297]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:54:42.265770 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:54:42.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.307370 systemd-resolved[1297]: Using system hostname 'ci-3510.3.2-a-08b227d6a8'. Feb 9 09:54:42.309201 systemd[1]: Started systemd-resolved.service. Feb 9 09:54:42.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:42.314405 systemd[1]: Reached target network.target. Feb 9 09:54:42.319156 systemd[1]: Reached target network-online.target. Feb 9 09:54:42.324336 systemd[1]: Reached target nss-lookup.target. Feb 9 09:54:42.448000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:54:42.453897 kernel: kauditd_printk_skb: 88 callbacks suppressed Feb 9 09:54:42.453958 kernel: audit: type=1305 audit(1707472482.448:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:54:42.448000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc727dcd0 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:42.492790 kernel: audit: type=1300 audit(1707472482.448:170): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc727dcd0 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:42.492892 augenrules[1315]: No rules Feb 9 09:54:42.448000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:54:42.504858 kernel: audit: type=1327 audit(1707472482.448:170): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:54:42.505285 systemd[1]: Finished audit-rules.service. Feb 9 09:54:42.523867 systemd-timesyncd[1299]: Contacted time server 23.141.40.124:123 (0.flatcar.pool.ntp.org). Feb 9 09:54:42.524203 systemd-timesyncd[1299]: Initial clock synchronization to Fri 2024-02-09 09:54:42.534664 UTC. Feb 9 09:54:49.253129 ldconfig[1279]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:54:49.263798 systemd[1]: Finished ldconfig.service. Feb 9 09:54:49.270179 systemd[1]: Starting systemd-update-done.service... Feb 9 09:54:49.311659 systemd[1]: Finished systemd-update-done.service. Feb 9 09:54:49.316991 systemd[1]: Reached target sysinit.target. Feb 9 09:54:49.321726 systemd[1]: Started motdgen.path. Feb 9 09:54:49.325862 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:54:49.332539 systemd[1]: Started logrotate.timer. Feb 9 09:54:49.336704 systemd[1]: Started mdadm.timer. Feb 9 09:54:49.340623 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:54:49.345785 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:54:49.345813 systemd[1]: Reached target paths.target. Feb 9 09:54:49.350202 systemd[1]: Reached target timers.target. Feb 9 09:54:49.355415 systemd[1]: Listening on dbus.socket. Feb 9 09:54:49.361058 systemd[1]: Starting docker.socket... Feb 9 09:54:49.367711 systemd[1]: Listening on sshd.socket. Feb 9 09:54:49.372330 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:49.372796 systemd[1]: Listening on docker.socket. Feb 9 09:54:49.377648 systemd[1]: Reached target sockets.target. Feb 9 09:54:49.382202 systemd[1]: Reached target basic.target. Feb 9 09:54:49.386838 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:54:49.386864 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:54:49.388009 systemd[1]: Starting containerd.service... Feb 9 09:54:49.393334 systemd[1]: Starting dbus.service... Feb 9 09:54:49.397778 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:54:49.403358 systemd[1]: Starting extend-filesystems.service... Feb 9 09:54:49.408129 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:54:49.409162 systemd[1]: Starting motdgen.service... Feb 9 09:54:49.414089 systemd[1]: Started nvidia.service. Feb 9 09:54:49.419639 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:54:49.425455 systemd[1]: Starting prepare-critools.service... Feb 9 09:54:49.431080 systemd[1]: Starting prepare-helm.service... Feb 9 09:54:49.436645 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:54:49.444677 systemd[1]: Starting sshd-keygen.service... Feb 9 09:54:49.450813 systemd[1]: Starting systemd-logind.service... Feb 9 09:54:49.455727 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:49.455788 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:54:49.456203 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:54:49.456924 systemd[1]: Starting update-engine.service... Feb 9 09:54:49.462782 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:54:49.466346 jq[1325]: false Feb 9 09:54:49.476275 jq[1345]: true Feb 9 09:54:49.476588 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:54:49.479512 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:54:49.485924 extend-filesystems[1326]: Found sda Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda1 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda2 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda3 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found usr Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda4 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda6 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda7 Feb 9 09:54:49.494305 extend-filesystems[1326]: Found sda9 Feb 9 09:54:49.494305 extend-filesystems[1326]: Checking size of /dev/sda9 Feb 9 09:54:49.485974 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:54:49.486151 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:54:49.499508 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:54:49.499701 systemd[1]: Finished motdgen.service. Feb 9 09:54:49.545209 jq[1356]: true Feb 9 09:54:49.568745 env[1354]: time="2024-02-09T09:54:49.568694181Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:54:49.603234 env[1354]: time="2024-02-09T09:54:49.603026896Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:54:49.603234 env[1354]: time="2024-02-09T09:54:49.603191172Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604535073Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604595581Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604794433Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604810281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604823567Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:54:49.604839 env[1354]: time="2024-02-09T09:54:49.604833211Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.604753 systemd-logind[1340]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 09:54:49.605240 env[1354]: time="2024-02-09T09:54:49.604900082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.605240 env[1354]: time="2024-02-09T09:54:49.605054554Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:49.605459 systemd-logind[1340]: New seat seat0. Feb 9 09:54:49.612898 env[1354]: time="2024-02-09T09:54:49.612839033Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:49.612898 env[1354]: time="2024-02-09T09:54:49.612878931Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:54:49.613018 env[1354]: time="2024-02-09T09:54:49.612965571Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:54:49.613018 env[1354]: time="2024-02-09T09:54:49.612978337Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624663220Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624710402Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624724569Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624757624Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624773311Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624787037Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.624799483Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625142442Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625157449Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625170015Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625181740Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625196027Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:54:49.625346 env[1354]: time="2024-02-09T09:54:49.625350458Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:54:49.625728 env[1354]: time="2024-02-09T09:54:49.625427894Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:54:49.625728 env[1354]: time="2024-02-09T09:54:49.625645034Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:54:49.625728 env[1354]: time="2024-02-09T09:54:49.625668445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625728 env[1354]: time="2024-02-09T09:54:49.625681571Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:54:49.625728 env[1354]: time="2024-02-09T09:54:49.625724311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625736516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625748922Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625760247Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625771773Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625784098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625794943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625807990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625831 env[1354]: time="2024-02-09T09:54:49.625821676Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:54:49.625988 env[1354]: time="2024-02-09T09:54:49.625927325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625988 env[1354]: time="2024-02-09T09:54:49.625942092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625988 env[1354]: time="2024-02-09T09:54:49.625954217Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.625988 env[1354]: time="2024-02-09T09:54:49.625965342Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:54:49.625988 env[1354]: time="2024-02-09T09:54:49.625979669Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:54:49.626089 env[1354]: time="2024-02-09T09:54:49.625990714Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:54:49.626089 env[1354]: time="2024-02-09T09:54:49.626007562Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:54:49.626089 env[1354]: time="2024-02-09T09:54:49.626040937Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:54:49.626418 env[1354]: time="2024-02-09T09:54:49.626267162Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.626512395Z" level=info msg="Connect containerd service" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.626605398Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.627385639Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629092868Z" level=info msg="Start subscribing containerd event" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629151415Z" level=info msg="Start recovering state" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629211763Z" level=info msg="Start event monitor" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629229772Z" level=info msg="Start snapshots syncer" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629239456Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629247580Z" level=info msg="Start streaming server" Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629621433Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.629669895Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:54:49.645100 env[1354]: time="2024-02-09T09:54:49.640439555Z" level=info msg="containerd successfully booted in 0.081168s" Feb 9 09:54:49.631281 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:54:49.646458 extend-filesystems[1326]: Old size kept for /dev/sda9 Feb 9 09:54:49.646458 extend-filesystems[1326]: Found sr0 Feb 9 09:54:49.631481 systemd[1]: Finished extend-filesystems.service. Feb 9 09:54:49.640491 systemd[1]: Started containerd.service. Feb 9 09:54:49.675136 dbus-daemon[1324]: [system] SELinux support is enabled Feb 9 09:54:49.675345 systemd[1]: Started dbus.service. Feb 9 09:54:49.681064 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:54:49.681089 systemd[1]: Reached target system-config.target. Feb 9 09:54:49.689921 tar[1348]: ./ Feb 9 09:54:49.689921 tar[1348]: ./loopback Feb 9 09:54:49.691957 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:54:49.691983 systemd[1]: Reached target user-config.target. Feb 9 09:54:49.703050 tar[1349]: crictl Feb 9 09:54:49.703744 tar[1350]: linux-arm64/helm Feb 9 09:54:49.703814 systemd[1]: Started systemd-logind.service. Feb 9 09:54:49.711777 bash[1381]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:54:49.713278 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:54:49.793482 tar[1348]: ./bandwidth Feb 9 09:54:49.803030 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 09:54:49.861637 tar[1348]: ./ptp Feb 9 09:54:49.918242 tar[1348]: ./vlan Feb 9 09:54:49.980646 tar[1348]: ./host-device Feb 9 09:54:50.035502 tar[1348]: ./tuning Feb 9 09:54:50.093934 tar[1348]: ./vrf Feb 9 09:54:50.147033 tar[1348]: ./sbr Feb 9 09:54:50.199638 tar[1348]: ./tap Feb 9 09:54:50.217385 update_engine[1342]: I0209 09:54:50.203338 1342 main.cc:92] Flatcar Update Engine starting Feb 9 09:54:50.255830 tar[1348]: ./dhcp Feb 9 09:54:50.267463 systemd[1]: Started update-engine.service. Feb 9 09:54:50.267903 update_engine[1342]: I0209 09:54:50.267518 1342 update_check_scheduler.cc:74] Next update check in 3m10s Feb 9 09:54:50.276283 systemd[1]: Started locksmithd.service. Feb 9 09:54:50.422111 tar[1348]: ./static Feb 9 09:54:50.452752 tar[1350]: linux-arm64/LICENSE Feb 9 09:54:50.452883 tar[1350]: linux-arm64/README.md Feb 9 09:54:50.457394 systemd[1]: Finished prepare-helm.service. Feb 9 09:54:50.467729 tar[1348]: ./firewall Feb 9 09:54:50.499667 tar[1348]: ./macvlan Feb 9 09:54:50.529459 tar[1348]: ./dummy Feb 9 09:54:50.557792 tar[1348]: ./bridge Feb 9 09:54:50.588665 tar[1348]: ./ipvlan Feb 9 09:54:50.617404 tar[1348]: ./portmap Feb 9 09:54:50.624719 systemd[1]: Finished prepare-critools.service. Feb 9 09:54:50.654522 tar[1348]: ./host-local Feb 9 09:54:50.741501 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:54:52.053340 locksmithd[1431]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:54:52.208259 sshd_keygen[1343]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:54:52.224677 systemd[1]: Finished sshd-keygen.service. Feb 9 09:54:52.230525 systemd[1]: Starting issuegen.service... Feb 9 09:54:52.235353 systemd[1]: Started waagent.service. Feb 9 09:54:52.240143 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:54:52.240300 systemd[1]: Finished issuegen.service. Feb 9 09:54:52.245940 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:54:52.266701 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:54:52.273659 systemd[1]: Started getty@tty1.service. Feb 9 09:54:52.279891 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 09:54:52.285279 systemd[1]: Reached target getty.target. Feb 9 09:54:52.289762 systemd[1]: Reached target multi-user.target. Feb 9 09:54:52.296126 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:54:52.312168 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:54:52.312375 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:54:52.318292 systemd[1]: Startup finished in 786ms (kernel) + 17.730s (initrd) + 24.668s (userspace) = 43.184s. Feb 9 09:54:52.993555 login[1453]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:54:52.995036 login[1454]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:54:53.047622 systemd[1]: Created slice user-500.slice. Feb 9 09:54:53.048681 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:54:53.052546 systemd-logind[1340]: New session 1 of user core. Feb 9 09:54:53.055421 systemd-logind[1340]: New session 2 of user core. Feb 9 09:54:53.093104 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:54:53.094580 systemd[1]: Starting user@500.service... Feb 9 09:54:53.127742 (systemd)[1457]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:54:53.415550 systemd[1457]: Queued start job for default target default.target. Feb 9 09:54:53.416036 systemd[1457]: Reached target paths.target. Feb 9 09:54:53.416055 systemd[1457]: Reached target sockets.target. Feb 9 09:54:53.416066 systemd[1457]: Reached target timers.target. Feb 9 09:54:53.416076 systemd[1457]: Reached target basic.target. Feb 9 09:54:53.416175 systemd[1]: Started user@500.service. Feb 9 09:54:53.417050 systemd[1]: Started session-1.scope. Feb 9 09:54:53.417595 systemd[1]: Started session-2.scope. Feb 9 09:54:53.417597 systemd[1457]: Reached target default.target. Feb 9 09:54:53.417645 systemd[1457]: Startup finished in 284ms. Feb 9 09:54:58.979751 waagent[1451]: 2024-02-09T09:54:58.979643Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 09:54:59.015778 waagent[1451]: 2024-02-09T09:54:59.015684Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 09:54:59.020950 waagent[1451]: 2024-02-09T09:54:59.020871Z INFO Daemon Daemon Python: 3.9.16 Feb 9 09:54:59.025885 waagent[1451]: 2024-02-09T09:54:59.025778Z INFO Daemon Daemon Run daemon Feb 9 09:54:59.030703 waagent[1451]: 2024-02-09T09:54:59.030641Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 09:54:59.048387 waagent[1451]: 2024-02-09T09:54:59.048242Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:54:59.066975 waagent[1451]: 2024-02-09T09:54:59.066839Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:54:59.077961 waagent[1451]: 2024-02-09T09:54:59.077866Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:54:59.083858 waagent[1451]: 2024-02-09T09:54:59.083768Z INFO Daemon Daemon Using waagent for provisioning Feb 9 09:54:59.090230 waagent[1451]: 2024-02-09T09:54:59.090155Z INFO Daemon Daemon Activate resource disk Feb 9 09:54:59.095459 waagent[1451]: 2024-02-09T09:54:59.095387Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 09:54:59.110286 waagent[1451]: 2024-02-09T09:54:59.110205Z INFO Daemon Daemon Found device: None Feb 9 09:54:59.115961 waagent[1451]: 2024-02-09T09:54:59.115885Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 09:54:59.125925 waagent[1451]: 2024-02-09T09:54:59.125847Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 09:54:59.139019 waagent[1451]: 2024-02-09T09:54:59.138949Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:54:59.146422 waagent[1451]: 2024-02-09T09:54:59.146347Z INFO Daemon Daemon Running default provisioning handler Feb 9 09:54:59.160663 waagent[1451]: 2024-02-09T09:54:59.160525Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:54:59.176751 waagent[1451]: 2024-02-09T09:54:59.176620Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:54:59.187113 waagent[1451]: 2024-02-09T09:54:59.187032Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:54:59.192591 waagent[1451]: 2024-02-09T09:54:59.192517Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 09:54:59.323607 waagent[1451]: 2024-02-09T09:54:59.323466Z INFO Daemon Daemon Successfully mounted dvd Feb 9 09:54:59.432932 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 09:54:59.485479 waagent[1451]: 2024-02-09T09:54:59.485299Z INFO Daemon Daemon Detect protocol endpoint Feb 9 09:54:59.491176 waagent[1451]: 2024-02-09T09:54:59.491099Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:54:59.497627 waagent[1451]: 2024-02-09T09:54:59.497556Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 09:54:59.506528 waagent[1451]: 2024-02-09T09:54:59.506447Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 09:54:59.512999 waagent[1451]: 2024-02-09T09:54:59.512928Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 09:54:59.519181 waagent[1451]: 2024-02-09T09:54:59.519115Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 09:54:59.630955 waagent[1451]: 2024-02-09T09:54:59.630838Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 09:54:59.638519 waagent[1451]: 2024-02-09T09:54:59.638473Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 09:54:59.644431 waagent[1451]: 2024-02-09T09:54:59.644368Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 09:55:00.259262 waagent[1451]: 2024-02-09T09:55:00.259119Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 09:55:00.276199 waagent[1451]: 2024-02-09T09:55:00.276122Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 09:55:00.283093 waagent[1451]: 2024-02-09T09:55:00.283018Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 09:55:00.359753 waagent[1451]: 2024-02-09T09:55:00.359618Z INFO Daemon Daemon Found private key matching thumbprint 575C47585D1459C00D5A0F07B441A63D325669A3 Feb 9 09:55:00.369659 waagent[1451]: 2024-02-09T09:55:00.369569Z INFO Daemon Daemon Certificate with thumbprint CCF95EB6DF56FA80DF6FFCFEF6B62AF88FBBDB5A has no matching private key. Feb 9 09:55:00.380063 waagent[1451]: 2024-02-09T09:55:00.379980Z INFO Daemon Daemon Fetch goal state completed Feb 9 09:55:00.431765 waagent[1451]: 2024-02-09T09:55:00.431706Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 782ca55a-0787-4c90-8bab-f04a0b1b9764 New eTag: 15014172787363900716] Feb 9 09:55:00.444585 waagent[1451]: 2024-02-09T09:55:00.444494Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:55:00.466103 waagent[1451]: 2024-02-09T09:55:00.466018Z INFO Daemon Daemon Starting provisioning Feb 9 09:55:00.472195 waagent[1451]: 2024-02-09T09:55:00.472115Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 09:55:00.478185 waagent[1451]: 2024-02-09T09:55:00.478111Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-08b227d6a8] Feb 9 09:55:00.550003 waagent[1451]: 2024-02-09T09:55:00.549875Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-08b227d6a8] Feb 9 09:55:00.557252 waagent[1451]: 2024-02-09T09:55:00.557165Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 09:55:00.565231 waagent[1451]: 2024-02-09T09:55:00.565148Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 09:55:00.582552 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 09:55:00.582723 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 09:55:00.582781 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 09:55:00.583014 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:55:00.589355 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 09:55:00.590651 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:55:00.590828 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:55:00.592804 systemd[1]: Starting systemd-networkd.service... Feb 9 09:55:00.619135 systemd-networkd[1501]: enP65077s1: Link UP Feb 9 09:55:00.619146 systemd-networkd[1501]: enP65077s1: Gained carrier Feb 9 09:55:00.620257 systemd-networkd[1501]: eth0: Link UP Feb 9 09:55:00.620268 systemd-networkd[1501]: eth0: Gained carrier Feb 9 09:55:00.620599 systemd-networkd[1501]: lo: Link UP Feb 9 09:55:00.620609 systemd-networkd[1501]: lo: Gained carrier Feb 9 09:55:00.620838 systemd-networkd[1501]: eth0: Gained IPv6LL Feb 9 09:55:00.621980 systemd-networkd[1501]: Enumeration completed Feb 9 09:55:00.622095 systemd[1]: Started systemd-networkd.service. Feb 9 09:55:00.623864 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:55:00.631094 waagent[1451]: 2024-02-09T09:55:00.624400Z INFO Daemon Daemon Create user account if not exists Feb 9 09:55:00.631862 waagent[1451]: 2024-02-09T09:55:00.631783Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 09:55:00.639109 systemd-networkd[1501]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:55:00.639771 waagent[1451]: 2024-02-09T09:55:00.639667Z INFO Daemon Daemon Configure sudoer Feb 9 09:55:00.645342 waagent[1451]: 2024-02-09T09:55:00.645243Z INFO Daemon Daemon Configure sshd Feb 9 09:55:00.650673 waagent[1451]: 2024-02-09T09:55:00.650588Z INFO Daemon Daemon Deploy ssh public key. Feb 9 09:55:00.660416 systemd-networkd[1501]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:55:00.662865 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:55:01.903195 waagent[1451]: 2024-02-09T09:55:01.903126Z INFO Daemon Daemon Provisioning complete Feb 9 09:55:01.927401 waagent[1451]: 2024-02-09T09:55:01.927332Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 09:55:01.935125 waagent[1451]: 2024-02-09T09:55:01.935042Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 09:55:01.946984 waagent[1451]: 2024-02-09T09:55:01.946903Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 09:55:02.246691 waagent[1510]: 2024-02-09T09:55:02.246601Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 09:55:02.247797 waagent[1510]: 2024-02-09T09:55:02.247740Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:02.248043 waagent[1510]: 2024-02-09T09:55:02.247995Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:02.260388 waagent[1510]: 2024-02-09T09:55:02.260316Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 09:55:02.260693 waagent[1510]: 2024-02-09T09:55:02.260644Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 09:55:02.333422 waagent[1510]: 2024-02-09T09:55:02.333270Z INFO ExtHandler ExtHandler Found private key matching thumbprint 575C47585D1459C00D5A0F07B441A63D325669A3 Feb 9 09:55:02.333800 waagent[1510]: 2024-02-09T09:55:02.333747Z INFO ExtHandler ExtHandler Certificate with thumbprint CCF95EB6DF56FA80DF6FFCFEF6B62AF88FBBDB5A has no matching private key. Feb 9 09:55:02.334113 waagent[1510]: 2024-02-09T09:55:02.334064Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 09:55:02.350470 waagent[1510]: 2024-02-09T09:55:02.350409Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 5647b594-2dac-4b74-b22f-2e3151501be3 New eTag: 15014172787363900716] Feb 9 09:55:02.351263 waagent[1510]: 2024-02-09T09:55:02.351205Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:55:02.431920 waagent[1510]: 2024-02-09T09:55:02.431773Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:55:02.456005 waagent[1510]: 2024-02-09T09:55:02.455917Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1510 Feb 9 09:55:02.459902 waagent[1510]: 2024-02-09T09:55:02.459836Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:55:02.461364 waagent[1510]: 2024-02-09T09:55:02.461293Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:55:02.579862 waagent[1510]: 2024-02-09T09:55:02.579753Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:55:02.580465 waagent[1510]: 2024-02-09T09:55:02.580402Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:55:02.588144 waagent[1510]: 2024-02-09T09:55:02.588089Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:55:02.588832 waagent[1510]: 2024-02-09T09:55:02.588774Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:55:02.590113 waagent[1510]: 2024-02-09T09:55:02.590053Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 09:55:02.591593 waagent[1510]: 2024-02-09T09:55:02.591522Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:55:02.591871 waagent[1510]: 2024-02-09T09:55:02.591801Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:02.592443 waagent[1510]: 2024-02-09T09:55:02.592373Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:02.593038 waagent[1510]: 2024-02-09T09:55:02.592975Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:55:02.593380 waagent[1510]: 2024-02-09T09:55:02.593293Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:55:02.593380 waagent[1510]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:55:02.593380 waagent[1510]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:55:02.593380 waagent[1510]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:55:02.593380 waagent[1510]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:02.593380 waagent[1510]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:02.593380 waagent[1510]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:02.595649 waagent[1510]: 2024-02-09T09:55:02.595479Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:55:02.596192 waagent[1510]: 2024-02-09T09:55:02.596110Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:02.596952 waagent[1510]: 2024-02-09T09:55:02.596880Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:02.597561 waagent[1510]: 2024-02-09T09:55:02.597487Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:55:02.597720 waagent[1510]: 2024-02-09T09:55:02.597670Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:55:02.597833 waagent[1510]: 2024-02-09T09:55:02.597792Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:55:02.598743 waagent[1510]: 2024-02-09T09:55:02.598684Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:55:02.598899 waagent[1510]: 2024-02-09T09:55:02.598831Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:55:02.599667 waagent[1510]: 2024-02-09T09:55:02.599575Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:55:02.599856 waagent[1510]: 2024-02-09T09:55:02.599785Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:55:02.600151 waagent[1510]: 2024-02-09T09:55:02.600086Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:55:02.610997 waagent[1510]: 2024-02-09T09:55:02.610916Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 09:55:02.612487 waagent[1510]: 2024-02-09T09:55:02.612430Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:55:02.614285 waagent[1510]: 2024-02-09T09:55:02.614231Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 09:55:02.641296 waagent[1510]: 2024-02-09T09:55:02.641229Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 09:55:02.658060 waagent[1510]: 2024-02-09T09:55:02.657928Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1501' Feb 9 09:55:02.736756 waagent[1510]: 2024-02-09T09:55:02.736620Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:55:02.736756 waagent[1510]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:55:02.736756 waagent[1510]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:55:02.736756 waagent[1510]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:42:fa brd ff:ff:ff:ff:ff:ff Feb 9 09:55:02.736756 waagent[1510]: 3: enP65077s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:42:fa brd ff:ff:ff:ff:ff:ff\ altname enP65077p0s2 Feb 9 09:55:02.736756 waagent[1510]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:55:02.736756 waagent[1510]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:55:02.736756 waagent[1510]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:55:02.736756 waagent[1510]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:55:02.736756 waagent[1510]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:55:02.736756 waagent[1510]: 2: eth0 inet6 fe80::20d:3aff:fec4:42fa/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:55:02.791877 waagent[1510]: 2024-02-09T09:55:02.791811Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 09:55:02.949655 waagent[1451]: 2024-02-09T09:55:02.949474Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 09:55:02.953362 waagent[1451]: 2024-02-09T09:55:02.953289Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 09:55:04.115335 waagent[1539]: 2024-02-09T09:55:04.115213Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 09:55:04.116412 waagent[1539]: 2024-02-09T09:55:04.116351Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 09:55:04.116649 waagent[1539]: 2024-02-09T09:55:04.116601Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 09:55:04.124559 waagent[1539]: 2024-02-09T09:55:04.124426Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:55:04.125166 waagent[1539]: 2024-02-09T09:55:04.125111Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:04.125452 waagent[1539]: 2024-02-09T09:55:04.125399Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:04.143791 waagent[1539]: 2024-02-09T09:55:04.143694Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 09:55:04.153242 waagent[1539]: 2024-02-09T09:55:04.153179Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 09:55:04.154522 waagent[1539]: 2024-02-09T09:55:04.154463Z INFO ExtHandler Feb 9 09:55:04.154772 waagent[1539]: 2024-02-09T09:55:04.154723Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 92e42fc4-4931-487b-bf4c-e1d4dbffcd97 eTag: 15014172787363900716 source: Fabric] Feb 9 09:55:04.155608 waagent[1539]: 2024-02-09T09:55:04.155552Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 09:55:04.156930 waagent[1539]: 2024-02-09T09:55:04.156871Z INFO ExtHandler Feb 9 09:55:04.157155 waagent[1539]: 2024-02-09T09:55:04.157108Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 09:55:04.168974 waagent[1539]: 2024-02-09T09:55:04.168917Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 09:55:04.169669 waagent[1539]: 2024-02-09T09:55:04.169621Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:55:04.191180 waagent[1539]: 2024-02-09T09:55:04.191116Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 09:55:04.264424 waagent[1539]: 2024-02-09T09:55:04.264270Z INFO ExtHandler Downloaded certificate {'thumbprint': 'CCF95EB6DF56FA80DF6FFCFEF6B62AF88FBBDB5A', 'hasPrivateKey': False} Feb 9 09:55:04.265670 waagent[1539]: 2024-02-09T09:55:04.265583Z INFO ExtHandler Downloaded certificate {'thumbprint': '575C47585D1459C00D5A0F07B441A63D325669A3', 'hasPrivateKey': True} Feb 9 09:55:04.266838 waagent[1539]: 2024-02-09T09:55:04.266780Z INFO ExtHandler Fetch goal state completed Feb 9 09:55:04.293842 waagent[1539]: 2024-02-09T09:55:04.293767Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1539 Feb 9 09:55:04.297520 waagent[1539]: 2024-02-09T09:55:04.297447Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:55:04.299138 waagent[1539]: 2024-02-09T09:55:04.299071Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:55:04.304009 waagent[1539]: 2024-02-09T09:55:04.303957Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:55:04.304549 waagent[1539]: 2024-02-09T09:55:04.304491Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:55:04.312647 waagent[1539]: 2024-02-09T09:55:04.312591Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:55:04.313281 waagent[1539]: 2024-02-09T09:55:04.313228Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:55:04.319092 waagent[1539]: 2024-02-09T09:55:04.318994Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 09:55:04.322831 waagent[1539]: 2024-02-09T09:55:04.322773Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 09:55:04.324527 waagent[1539]: 2024-02-09T09:55:04.324456Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:55:04.324886 waagent[1539]: 2024-02-09T09:55:04.324811Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:04.325372 waagent[1539]: 2024-02-09T09:55:04.325278Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:04.325977 waagent[1539]: 2024-02-09T09:55:04.325901Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:55:04.326276 waagent[1539]: 2024-02-09T09:55:04.326215Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:55:04.326276 waagent[1539]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:55:04.326276 waagent[1539]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:55:04.326276 waagent[1539]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:55:04.326276 waagent[1539]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:04.326276 waagent[1539]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:04.326276 waagent[1539]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:55:04.328388 waagent[1539]: 2024-02-09T09:55:04.328249Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:55:04.328845 waagent[1539]: 2024-02-09T09:55:04.328767Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:55:04.330363 waagent[1539]: 2024-02-09T09:55:04.329375Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:55:04.332183 waagent[1539]: 2024-02-09T09:55:04.332045Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:55:04.332495 waagent[1539]: 2024-02-09T09:55:04.332426Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:55:04.332711 waagent[1539]: 2024-02-09T09:55:04.332637Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:55:04.333410 waagent[1539]: 2024-02-09T09:55:04.333292Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:55:04.333898 waagent[1539]: 2024-02-09T09:55:04.333828Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:55:04.334109 waagent[1539]: 2024-02-09T09:55:04.334038Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:55:04.337269 waagent[1539]: 2024-02-09T09:55:04.337196Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:55:04.339352 waagent[1539]: 2024-02-09T09:55:04.339140Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:55:04.347367 waagent[1539]: 2024-02-09T09:55:04.347270Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:55:04.347367 waagent[1539]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:55:04.347367 waagent[1539]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:55:04.347367 waagent[1539]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:42:fa brd ff:ff:ff:ff:ff:ff Feb 9 09:55:04.347367 waagent[1539]: 3: enP65077s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:42:fa brd ff:ff:ff:ff:ff:ff\ altname enP65077p0s2 Feb 9 09:55:04.347367 waagent[1539]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:55:04.347367 waagent[1539]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:55:04.347367 waagent[1539]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:55:04.347367 waagent[1539]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:55:04.347367 waagent[1539]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:55:04.347367 waagent[1539]: 2: eth0 inet6 fe80::20d:3aff:fec4:42fa/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:55:04.352540 waagent[1539]: 2024-02-09T09:55:04.352458Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 09:55:04.353150 waagent[1539]: 2024-02-09T09:55:04.353074Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 09:55:04.377825 waagent[1539]: 2024-02-09T09:55:04.377701Z INFO ExtHandler ExtHandler Feb 9 09:55:04.379993 waagent[1539]: 2024-02-09T09:55:04.379904Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 5a7c32df-4e51-4d9e-8d42-491c2e912db8 correlation d19112fe-a1a9-4741-8bc2-67a72a46cb99 created: 2024-02-09T09:53:12.135933Z] Feb 9 09:55:04.381390 waagent[1539]: 2024-02-09T09:55:04.381303Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 09:55:04.383213 waagent[1539]: 2024-02-09T09:55:04.383147Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Feb 9 09:55:04.404679 waagent[1539]: 2024-02-09T09:55:04.404610Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 09:55:04.432496 waagent[1539]: 2024-02-09T09:55:04.432242Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F1D2D0F7-1271-4356-8E9E-00A5B4C3FFDB;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 09:55:04.620930 waagent[1539]: 2024-02-09T09:55:04.620793Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 09:55:04.620930 waagent[1539]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.620930 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.620930 waagent[1539]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.620930 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.620930 waagent[1539]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.620930 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.620930 waagent[1539]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:55:04.620930 waagent[1539]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:55:04.620930 waagent[1539]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:55:04.628108 waagent[1539]: 2024-02-09T09:55:04.627936Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 09:55:04.628108 waagent[1539]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.628108 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.628108 waagent[1539]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.628108 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.628108 waagent[1539]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:55:04.628108 waagent[1539]: pkts bytes target prot opt in out source destination Feb 9 09:55:04.628108 waagent[1539]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:55:04.628108 waagent[1539]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:55:04.628108 waagent[1539]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:55:04.628619 waagent[1539]: 2024-02-09T09:55:04.628562Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 09:55:27.926666 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 09:55:35.168835 update_engine[1342]: I0209 09:55:35.168792 1342 update_attempter.cc:509] Updating boot flags... Feb 9 09:55:48.779331 systemd[1]: Created slice system-sshd.slice. Feb 9 09:55:48.780408 systemd[1]: Started sshd@0-10.200.20.4:22-10.200.12.6:46626.service. Feb 9 09:55:49.488229 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 46626 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:49.505868 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:49.509353 systemd-logind[1340]: New session 3 of user core. Feb 9 09:55:49.510242 systemd[1]: Started session-3.scope. Feb 9 09:55:49.838174 systemd[1]: Started sshd@1-10.200.20.4:22-10.200.12.6:46636.service. Feb 9 09:55:50.267957 sshd[1664]: Accepted publickey for core from 10.200.12.6 port 46636 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:50.269215 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:50.272997 systemd-logind[1340]: New session 4 of user core. Feb 9 09:55:50.273436 systemd[1]: Started session-4.scope. Feb 9 09:55:50.575386 sshd[1664]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:50.577865 systemd[1]: sshd@1-10.200.20.4:22-10.200.12.6:46636.service: Deactivated successfully. Feb 9 09:55:50.578574 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:55:50.579038 systemd-logind[1340]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:55:50.579719 systemd-logind[1340]: Removed session 4. Feb 9 09:55:50.644581 systemd[1]: Started sshd@2-10.200.20.4:22-10.200.12.6:46640.service. Feb 9 09:55:51.058295 sshd[1670]: Accepted publickey for core from 10.200.12.6 port 46640 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:51.059549 sshd[1670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:51.063304 systemd-logind[1340]: New session 5 of user core. Feb 9 09:55:51.063743 systemd[1]: Started session-5.scope. Feb 9 09:55:51.357751 sshd[1670]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:51.360342 systemd[1]: sshd@2-10.200.20.4:22-10.200.12.6:46640.service: Deactivated successfully. Feb 9 09:55:51.360980 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:55:51.361519 systemd-logind[1340]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:55:51.362355 systemd-logind[1340]: Removed session 5. Feb 9 09:55:51.420583 systemd[1]: Started sshd@3-10.200.20.4:22-10.200.12.6:46642.service. Feb 9 09:55:51.794582 sshd[1676]: Accepted publickey for core from 10.200.12.6 port 46642 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:51.795805 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:51.799537 systemd-logind[1340]: New session 6 of user core. Feb 9 09:55:51.799905 systemd[1]: Started session-6.scope. Feb 9 09:55:52.071330 sshd[1676]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:52.073929 systemd[1]: sshd@3-10.200.20.4:22-10.200.12.6:46642.service: Deactivated successfully. Feb 9 09:55:52.074608 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:55:52.075139 systemd-logind[1340]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:55:52.075928 systemd-logind[1340]: Removed session 6. Feb 9 09:55:52.140788 systemd[1]: Started sshd@4-10.200.20.4:22-10.200.12.6:46654.service. Feb 9 09:55:52.554450 sshd[1682]: Accepted publickey for core from 10.200.12.6 port 46654 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:52.555954 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:52.559896 systemd[1]: Started session-7.scope. Feb 9 09:55:52.560420 systemd-logind[1340]: New session 7 of user core. Feb 9 09:55:53.047547 sudo[1685]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:55:53.047745 sudo[1685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:53.104446 dbus-daemon[1324]: avc: received setenforce notice (enforcing=1) Feb 9 09:55:53.105333 sudo[1685]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:53.187792 sshd[1682]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:53.190758 systemd[1]: sshd@4-10.200.20.4:22-10.200.12.6:46654.service: Deactivated successfully. Feb 9 09:55:53.191554 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:55:53.192073 systemd-logind[1340]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:55:53.192823 systemd-logind[1340]: Removed session 7. Feb 9 09:55:53.250836 systemd[1]: Started sshd@5-10.200.20.4:22-10.200.12.6:46664.service. Feb 9 09:55:53.625034 sshd[1689]: Accepted publickey for core from 10.200.12.6 port 46664 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:53.626367 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:53.630098 systemd-logind[1340]: New session 8 of user core. Feb 9 09:55:53.630544 systemd[1]: Started session-8.scope. Feb 9 09:55:53.843061 sudo[1693]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:55:53.843258 sudo[1693]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:53.845723 sudo[1693]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:53.849765 sudo[1692]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:55:53.849956 sudo[1692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:53.858367 systemd[1]: Stopping audit-rules.service... Feb 9 09:55:53.859000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:53.859000 audit[1696]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdff5b6b0 a2=420 a3=0 items=0 ppid=1 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.871402 auditctl[1696]: No rules Feb 9 09:55:53.893725 kernel: audit: type=1305 audit(1707472553.859:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:53.893808 kernel: audit: type=1300 audit(1707472553.859:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdff5b6b0 a2=420 a3=0 items=0 ppid=1 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.894044 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:55:53.894218 systemd[1]: Stopped audit-rules.service. Feb 9 09:55:53.859000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:53.902326 kernel: audit: type=1327 audit(1707472553.859:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:53.895968 systemd[1]: Starting audit-rules.service... Feb 9 09:55:53.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.919680 kernel: audit: type=1131 audit(1707472553.893:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.926881 augenrules[1713]: No rules Feb 9 09:55:53.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.927717 systemd[1]: Finished audit-rules.service. Feb 9 09:55:53.930508 sudo[1692]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:53.930000 audit[1692]: USER_END pid=1692 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.964608 kernel: audit: type=1130 audit(1707472553.927:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.964679 kernel: audit: type=1106 audit(1707472553.930:174): pid=1692 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.964705 kernel: audit: type=1104 audit(1707472553.930:175): pid=1692 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:53.930000 audit[1692]: CRED_DISP pid=1692 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.002657 sshd[1689]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:54.003000 audit[1689]: USER_END pid=1689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.005333 systemd[1]: sshd@5-10.200.20.4:22-10.200.12.6:46664.service: Deactivated successfully. Feb 9 09:55:54.006022 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:55:54.007353 systemd-logind[1340]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:55:54.008220 systemd-logind[1340]: Removed session 8. Feb 9 09:55:54.003000 audit[1689]: CRED_DISP pid=1689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.048965 kernel: audit: type=1106 audit(1707472554.003:176): pid=1689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.049028 kernel: audit: type=1104 audit(1707472554.003:177): pid=1689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.049058 kernel: audit: type=1131 audit(1707472554.005:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.12.6:46664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.12.6:46664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.065523 systemd[1]: Started sshd@6-10.200.20.4:22-10.200.12.6:46666.service. Feb 9 09:55:54.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:46666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.441000 audit[1719]: USER_ACCT pid=1719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.441847 sshd[1719]: Accepted publickey for core from 10.200.12.6 port 46666 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:54.442000 audit[1719]: CRED_ACQ pid=1719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.442000 audit[1719]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe75555c0 a2=3 a3=1 items=0 ppid=1 pid=1719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:54.442000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:55:54.443384 sshd[1719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:54.447388 systemd[1]: Started session-9.scope. Feb 9 09:55:54.448141 systemd-logind[1340]: New session 9 of user core. Feb 9 09:55:54.451000 audit[1719]: USER_START pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.452000 audit[1721]: CRED_ACQ pid=1721 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:54.658000 audit[1722]: USER_ACCT pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.659967 sudo[1722]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:55:54.658000 audit[1722]: CRED_REFR pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:54.660163 sudo[1722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:54.660000 audit[1722]: USER_START pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:55.361565 systemd[1]: Starting docker.service... Feb 9 09:55:55.394152 env[1737]: time="2024-02-09T09:55:55.394095189Z" level=info msg="Starting up" Feb 9 09:55:55.395603 env[1737]: time="2024-02-09T09:55:55.395578524Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:55.395700 env[1737]: time="2024-02-09T09:55:55.395686817Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:55.395769 env[1737]: time="2024-02-09T09:55:55.395753625Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:55.395822 env[1737]: time="2024-02-09T09:55:55.395810912Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:55.397584 env[1737]: time="2024-02-09T09:55:55.397564678Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:55.397664 env[1737]: time="2024-02-09T09:55:55.397651608Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:55.397724 env[1737]: time="2024-02-09T09:55:55.397710895Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:55.397772 env[1737]: time="2024-02-09T09:55:55.397759981Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:55.544689 env[1737]: time="2024-02-09T09:55:55.544652607Z" level=info msg="Loading containers: start." Feb 9 09:55:55.627000 audit[1765]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.627000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd87dd660 a2=0 a3=1 items=0 ppid=1737 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 09:55:55.629000 audit[1767]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.629000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff8e3ae30 a2=0 a3=1 items=0 ppid=1737 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.629000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 09:55:55.630000 audit[1769]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.630000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd61daeb0 a2=0 a3=1 items=0 ppid=1737 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:55.632000 audit[1771]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.632000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffee21e430 a2=0 a3=1 items=0 ppid=1737 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:55.634000 audit[1773]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.634000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd29b79d0 a2=0 a3=1 items=0 ppid=1737 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 09:55:55.635000 audit[1775]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.635000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd4e74550 a2=0 a3=1 items=0 ppid=1737 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 09:55:55.652000 audit[1777]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.652000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffedaba120 a2=0 a3=1 items=0 ppid=1737 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 09:55:55.654000 audit[1779]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.654000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffdf87a8a0 a2=0 a3=1 items=0 ppid=1737 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 09:55:55.655000 audit[1781]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.655000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff3ae3c80 a2=0 a3=1 items=0 ppid=1737 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:55.671000 audit[1785]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.671000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffef0c0d40 a2=0 a3=1 items=0 ppid=1737 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:55.672000 audit[1786]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.672000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd131f1f0 a2=0 a3=1 items=0 ppid=1737 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:55.700333 kernel: Initializing XFRM netlink socket Feb 9 09:55:55.723419 env[1737]: time="2024-02-09T09:55:55.723379984Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 09:55:55.791000 audit[1794]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.791000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffdcb1fe90 a2=0 a3=1 items=0 ppid=1737 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 09:55:55.816000 audit[1797]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.816000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe7d4a260 a2=0 a3=1 items=0 ppid=1737 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 09:55:55.819000 audit[1800]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.819000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff6b95050 a2=0 a3=1 items=0 ppid=1737 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:55.821000 audit[1802]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.821000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff1ee2b00 a2=0 a3=1 items=0 ppid=1737 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:55.823000 audit[1804]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.823000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe0287b90 a2=0 a3=1 items=0 ppid=1737 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 09:55:55.825000 audit[1806]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.825000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff8b91e70 a2=0 a3=1 items=0 ppid=1737 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 09:55:55.827000 audit[1808]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.827000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd88b7020 a2=0 a3=1 items=0 ppid=1737 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 09:55:55.829000 audit[1810]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.829000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe54b00f0 a2=0 a3=1 items=0 ppid=1737 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 09:55:55.831000 audit[1812]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.831000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff323fa90 a2=0 a3=1 items=0 ppid=1737 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:55.832000 audit[1814]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.832000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe2658e00 a2=0 a3=1 items=0 ppid=1737 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:55.834000 audit[1816]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.834000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe5772950 a2=0 a3=1 items=0 ppid=1737 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 09:55:55.836526 systemd-networkd[1501]: docker0: Link UP Feb 9 09:55:55.854000 audit[1820]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.854000 audit[1820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc39ab840 a2=0 a3=1 items=0 ppid=1737 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.854000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:55.855000 audit[1821]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:55.855000 audit[1821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffca191060 a2=0 a3=1 items=0 ppid=1737 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:55.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:55.857630 env[1737]: time="2024-02-09T09:55:55.857598276Z" level=info msg="Loading containers: done." Feb 9 09:55:55.866413 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3439181176-merged.mount: Deactivated successfully. Feb 9 09:55:55.927188 env[1737]: time="2024-02-09T09:55:55.927095744Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 09:55:55.928176 env[1737]: time="2024-02-09T09:55:55.928147668Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 09:55:55.928547 env[1737]: time="2024-02-09T09:55:55.928520072Z" level=info msg="Daemon has completed initialization" Feb 9 09:55:55.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:55.961343 systemd[1]: Started docker.service. Feb 9 09:55:55.969487 env[1737]: time="2024-02-09T09:55:55.969315958Z" level=info msg="API listen on /run/docker.sock" Feb 9 09:55:55.984664 systemd[1]: Reloading. Feb 9 09:55:56.039603 /usr/lib/systemd/system-generators/torcx-generator[1867]: time="2024-02-09T09:55:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:56.039937 /usr/lib/systemd/system-generators/torcx-generator[1867]: time="2024-02-09T09:55:56Z" level=info msg="torcx already run" Feb 9 09:55:56.108632 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:56.108650 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:56.123680 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.188000 audit: BPF prog-id=35 op=LOAD Feb 9 09:55:56.189000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.190000 audit: BPF prog-id=36 op=LOAD Feb 9 09:55:56.190000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit: BPF prog-id=37 op=LOAD Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.191000 audit: BPF prog-id=38 op=LOAD Feb 9 09:55:56.191000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:55:56.191000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit: BPF prog-id=39 op=LOAD Feb 9 09:55:56.192000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit: BPF prog-id=40 op=LOAD Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit: BPF prog-id=41 op=LOAD Feb 9 09:55:56.192000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:55:56.192000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit: BPF prog-id=42 op=LOAD Feb 9 09:55:56.193000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit: BPF prog-id=43 op=LOAD Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit: BPF prog-id=44 op=LOAD Feb 9 09:55:56.193000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:55:56.193000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.193000 audit: BPF prog-id=45 op=LOAD Feb 9 09:55:56.193000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.194000 audit: BPF prog-id=46 op=LOAD Feb 9 09:55:56.195000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit: BPF prog-id=47 op=LOAD Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit: BPF prog-id=48 op=LOAD Feb 9 09:55:56.195000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:55:56.195000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:56.195000 audit: BPF prog-id=49 op=LOAD Feb 9 09:55:56.195000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:55:56.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:56.204426 systemd[1]: Started kubelet.service. Feb 9 09:55:56.269542 kubelet[1926]: E0209 09:55:56.269472 1926 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 09:55:56.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:56.271756 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:56.271873 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:56:00.317788 env[1354]: time="2024-02-09T09:56:00.317531185Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 09:56:01.084339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2231276420.mount: Deactivated successfully. Feb 9 09:56:02.588258 env[1354]: time="2024-02-09T09:56:02.588210772Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:02.596142 env[1354]: time="2024-02-09T09:56:02.596095902Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:02.600385 env[1354]: time="2024-02-09T09:56:02.600351397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:02.606195 env[1354]: time="2024-02-09T09:56:02.606159004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:02.606965 env[1354]: time="2024-02-09T09:56:02.606936120Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb\"" Feb 9 09:56:02.616048 env[1354]: time="2024-02-09T09:56:02.616012806Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 09:56:04.259447 env[1354]: time="2024-02-09T09:56:04.259372600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:04.266430 env[1354]: time="2024-02-09T09:56:04.266398770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:04.271943 env[1354]: time="2024-02-09T09:56:04.271907841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:04.277657 env[1354]: time="2024-02-09T09:56:04.277624570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:04.278446 env[1354]: time="2024-02-09T09:56:04.278418043Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f\"" Feb 9 09:56:04.288101 env[1354]: time="2024-02-09T09:56:04.288071977Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 09:56:05.406789 env[1354]: time="2024-02-09T09:56:05.406740476Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:05.412906 env[1354]: time="2024-02-09T09:56:05.412865948Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:05.416943 env[1354]: time="2024-02-09T09:56:05.416917074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:05.420704 env[1354]: time="2024-02-09T09:56:05.420668572Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:05.421427 env[1354]: time="2024-02-09T09:56:05.421398198Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663\"" Feb 9 09:56:05.429977 env[1354]: time="2024-02-09T09:56:05.429941769Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 09:56:06.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.492568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3719554384.mount: Deactivated successfully. Feb 9 09:56:06.493399 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 09:56:06.493531 systemd[1]: Stopped kubelet.service. Feb 9 09:56:06.494942 systemd[1]: Started kubelet.service. Feb 9 09:56:06.499281 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 09:56:06.499390 kernel: audit: type=1130 audit(1707472566.492:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.532968 kernel: audit: type=1131 audit(1707472566.492:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.533103 kernel: audit: type=1130 audit(1707472566.492:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:06.562439 kubelet[1959]: E0209 09:56:06.562395 1959 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 09:56:06.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:56:06.565596 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:56:06.565720 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:56:06.583365 kernel: audit: type=1131 audit(1707472566.564:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:56:07.385621 env[1354]: time="2024-02-09T09:56:07.385568342Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:07.390403 env[1354]: time="2024-02-09T09:56:07.390360633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:07.393858 env[1354]: time="2024-02-09T09:56:07.393827530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:07.397213 env[1354]: time="2024-02-09T09:56:07.397181457Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:07.397744 env[1354]: time="2024-02-09T09:56:07.397713983Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 9 09:56:07.407548 env[1354]: time="2024-02-09T09:56:07.407510982Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 09:56:07.971541 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount89102076.mount: Deactivated successfully. Feb 9 09:56:07.994829 env[1354]: time="2024-02-09T09:56:07.994777214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:08.002908 env[1354]: time="2024-02-09T09:56:08.002875904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:08.006648 env[1354]: time="2024-02-09T09:56:08.006619497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:08.011778 env[1354]: time="2024-02-09T09:56:08.011746765Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:08.012165 env[1354]: time="2024-02-09T09:56:08.012137558Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 09:56:08.020570 env[1354]: time="2024-02-09T09:56:08.020540139Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 09:56:08.656364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount847330045.mount: Deactivated successfully. Feb 9 09:56:13.683829 env[1354]: time="2024-02-09T09:56:13.683774958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.691208 env[1354]: time="2024-02-09T09:56:13.691161342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.694590 env[1354]: time="2024-02-09T09:56:13.694557352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.698847 env[1354]: time="2024-02-09T09:56:13.698820906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:13.699537 env[1354]: time="2024-02-09T09:56:13.699508717Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Feb 9 09:56:13.708401 env[1354]: time="2024-02-09T09:56:13.708370850Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 09:56:14.481623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2584905423.mount: Deactivated successfully. Feb 9 09:56:14.955926 env[1354]: time="2024-02-09T09:56:14.955868375Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:14.964352 env[1354]: time="2024-02-09T09:56:14.964319463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:14.969864 env[1354]: time="2024-02-09T09:56:14.969822218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:14.974989 env[1354]: time="2024-02-09T09:56:14.974946626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:14.975452 env[1354]: time="2024-02-09T09:56:14.975421380Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 09:56:16.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.743492 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 09:56:16.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.743666 systemd[1]: Stopped kubelet.service. Feb 9 09:56:16.773972 systemd[1]: Started kubelet.service. Feb 9 09:56:16.779953 kernel: audit: type=1130 audit(1707472576.742:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.780057 kernel: audit: type=1131 audit(1707472576.742:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.799114 kernel: audit: type=1130 audit(1707472576.779:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:16.859198 kubelet[2039]: E0209 09:56:16.859152 2039 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 09:56:16.861218 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:56:16.861361 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:56:16.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:56:16.880335 kernel: audit: type=1131 audit(1707472576.860:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:56:20.656783 systemd[1]: Stopped kubelet.service. Feb 9 09:56:20.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:20.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:20.683534 systemd[1]: Reloading. Feb 9 09:56:20.694872 kernel: audit: type=1130 audit(1707472580.655:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:20.694963 kernel: audit: type=1131 audit(1707472580.655:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:20.751390 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-09T09:56:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:56:20.752682 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-09T09:56:20Z" level=info msg="torcx already run" Feb 9 09:56:20.828641 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:56:20.828822 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:56:20.843811 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:56:20.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948238 kernel: audit: type=1400 audit(1707472580.910:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948362 kernel: audit: type=1400 audit(1707472580.910:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948396 kernel: audit: type=1400 audit(1707472580.910:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984314 kernel: audit: type=1400 audit(1707472580.910:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.928000 audit: BPF prog-id=50 op=LOAD Feb 9 09:56:20.929000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.947000 audit: BPF prog-id=51 op=LOAD Feb 9 09:56:20.947000 audit: BPF prog-id=36 op=UNLOAD Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit: BPF prog-id=52 op=LOAD Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.983000 audit: BPF prog-id=53 op=LOAD Feb 9 09:56:20.983000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:56:20.983000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit: BPF prog-id=54 op=LOAD Feb 9 09:56:20.985000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.985000 audit: BPF prog-id=55 op=LOAD Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.986000 audit: BPF prog-id=56 op=LOAD Feb 9 09:56:20.986000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:56:20.986000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.987000 audit: BPF prog-id=57 op=LOAD Feb 9 09:56:20.987000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:56:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit: BPF prog-id=58 op=LOAD Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.988000 audit: BPF prog-id=59 op=LOAD Feb 9 09:56:20.988000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:56:20.989000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.989000 audit: BPF prog-id=60 op=LOAD Feb 9 09:56:20.990000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit: BPF prog-id=61 op=LOAD Feb 9 09:56:20.992000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.992000 audit: BPF prog-id=62 op=LOAD Feb 9 09:56:20.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit: BPF prog-id=63 op=LOAD Feb 9 09:56:20.993000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:56:20.993000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:20.994000 audit: BPF prog-id=64 op=LOAD Feb 9 09:56:20.994000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:56:21.018545 systemd[1]: Started kubelet.service. Feb 9 09:56:21.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:21.068906 kubelet[2129]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:21.068906 kubelet[2129]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:56:21.068906 kubelet[2129]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:21.069258 kubelet[2129]: I0209 09:56:21.068968 2129 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:56:21.608695 kubelet[2129]: I0209 09:56:21.608656 2129 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 09:56:21.608695 kubelet[2129]: I0209 09:56:21.608688 2129 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:56:21.608904 kubelet[2129]: I0209 09:56:21.608884 2129 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 09:56:21.614599 kubelet[2129]: E0209 09:56:21.614578 2129 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.614748 kubelet[2129]: I0209 09:56:21.614736 2129 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:56:21.619472 kubelet[2129]: W0209 09:56:21.619449 2129 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:56:21.619959 kubelet[2129]: I0209 09:56:21.619941 2129 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:56:21.620152 kubelet[2129]: I0209 09:56:21.620137 2129 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:56:21.620297 kubelet[2129]: I0209 09:56:21.620278 2129 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 09:56:21.620401 kubelet[2129]: I0209 09:56:21.620302 2129 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 09:56:21.620401 kubelet[2129]: I0209 09:56:21.620325 2129 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 09:56:21.620457 kubelet[2129]: I0209 09:56:21.620425 2129 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:21.620532 kubelet[2129]: I0209 09:56:21.620516 2129 kubelet.go:393] "Attempting to sync node with API server" Feb 9 09:56:21.620564 kubelet[2129]: I0209 09:56:21.620537 2129 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:56:21.620564 kubelet[2129]: I0209 09:56:21.620554 2129 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:56:21.620564 kubelet[2129]: I0209 09:56:21.620567 2129 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:56:21.621130 kubelet[2129]: W0209 09:56:21.621083 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.621205 kubelet[2129]: E0209 09:56:21.621138 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.621238 kubelet[2129]: I0209 09:56:21.621205 2129 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:56:21.621468 kubelet[2129]: W0209 09:56:21.621447 2129 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:56:21.621876 kubelet[2129]: I0209 09:56:21.621852 2129 server.go:1232] "Started kubelet" Feb 9 09:56:21.621000 audit[2129]: AVC avc: denied { mac_admin } for pid=2129 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.621000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:21.621000 audit[2129]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000727020 a1=400034c7b0 a2=4000726ff0 a3=25 items=0 ppid=1 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.621000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:21.621000 audit[2129]: AVC avc: denied { mac_admin } for pid=2129 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.621000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:21.621000 audit[2129]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000507120 a1=400034c7c8 a2=40007270b0 a3=25 items=0 ppid=1 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.621000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:21.623575 kubelet[2129]: I0209 09:56:21.623185 2129 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:56:21.623575 kubelet[2129]: I0209 09:56:21.623218 2129 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:56:21.623575 kubelet[2129]: I0209 09:56:21.623267 2129 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:56:21.626515 kubelet[2129]: E0209 09:56:21.626497 2129 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:56:21.626624 kubelet[2129]: E0209 09:56:21.626613 2129 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:56:21.626972 kubelet[2129]: E0209 09:56:21.626882 2129 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-08b227d6a8.17b229443349e2f8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-08b227d6a8", UID:"ci-3510.3.2-a-08b227d6a8", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-08b227d6a8"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 56, 21, 621834488, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 56, 21, 621834488, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-08b227d6a8"}': 'Post "https://10.200.20.4:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.4:6443: connect: connection refused'(may retry after sleeping) Feb 9 09:56:21.627211 kubelet[2129]: W0209 09:56:21.627175 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-08b227d6a8&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.627292 kubelet[2129]: E0209 09:56:21.627281 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-08b227d6a8&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.627000 audit[2139]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.627000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc23ca8d0 a2=0 a3=1 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:56:21.629677 kubelet[2129]: I0209 09:56:21.629661 2129 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:56:21.630391 kubelet[2129]: I0209 09:56:21.630374 2129 server.go:462] "Adding debug handlers to kubelet server" Feb 9 09:56:21.631528 kubelet[2129]: I0209 09:56:21.631512 2129 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:56:21.631810 kubelet[2129]: I0209 09:56:21.631797 2129 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 09:56:21.630000 audit[2140]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.630000 audit[2140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd52c8a0 a2=0 a3=1 items=0 ppid=2129 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:56:21.633819 kubelet[2129]: I0209 09:56:21.633803 2129 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 09:56:21.633991 kubelet[2129]: I0209 09:56:21.633979 2129 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:56:21.634093 kubelet[2129]: I0209 09:56:21.634084 2129 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 09:56:21.634544 kubelet[2129]: W0209 09:56:21.634500 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.634667 kubelet[2129]: E0209 09:56:21.634655 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.634802 kubelet[2129]: E0209 09:56:21.634791 2129 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="200ms" Feb 9 09:56:21.633000 audit[2142]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.633000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffc4cc2d0 a2=0 a3=1 items=0 ppid=2129 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:56:21.635000 audit[2144]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.635000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5395be0 a2=0 a3=1 items=0 ppid=2129 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:56:21.677000 audit[2151]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.677000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe1b4d0d0 a2=0 a3=1 items=0 ppid=2129 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:56:21.679284 kubelet[2129]: I0209 09:56:21.678717 2129 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 09:56:21.678000 audit[2153]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:21.678000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb80e5a0 a2=0 a3=1 items=0 ppid=2129 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:56:21.679731 kubelet[2129]: I0209 09:56:21.679717 2129 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 09:56:21.679765 kubelet[2129]: I0209 09:56:21.679742 2129 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 09:56:21.679765 kubelet[2129]: I0209 09:56:21.679761 2129 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 09:56:21.679815 kubelet[2129]: E0209 09:56:21.679807 2129 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:56:21.680671 kubelet[2129]: W0209 09:56:21.680640 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.680750 kubelet[2129]: E0209 09:56:21.680679 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:21.679000 audit[2155]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:21.679000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb5c2b50 a2=0 a3=1 items=0 ppid=2129 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:56:21.680000 audit[2154]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.680000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc70cdbc0 a2=0 a3=1 items=0 ppid=2129 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:56:21.680000 audit[2156]: NETFILTER_CFG table=nat:37 family=10 entries=2 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:21.680000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffeb0585b0 a2=0 a3=1 items=0 ppid=2129 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:56:21.681000 audit[2157]: NETFILTER_CFG table=filter:38 family=10 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:21.681000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffed87c900 a2=0 a3=1 items=0 ppid=2129 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:56:21.682000 audit[2158]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.682000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbce5b50 a2=0 a3=1 items=0 ppid=2129 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:56:21.683000 audit[2159]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:21.683000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1b04550 a2=0 a3=1 items=0 ppid=2129 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:56:21.719647 kubelet[2129]: I0209 09:56:21.719615 2129 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:56:21.719647 kubelet[2129]: I0209 09:56:21.719647 2129 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:56:21.719775 kubelet[2129]: I0209 09:56:21.719665 2129 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:21.725089 kubelet[2129]: I0209 09:56:21.725062 2129 policy_none.go:49] "None policy: Start" Feb 9 09:56:21.725791 kubelet[2129]: I0209 09:56:21.725769 2129 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:56:21.725866 kubelet[2129]: I0209 09:56:21.725804 2129 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:56:21.733635 systemd[1]: Created slice kubepods.slice. Feb 9 09:56:21.736648 kubelet[2129]: I0209 09:56:21.736627 2129 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.737090 kubelet[2129]: E0209 09:56:21.737077 2129 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.739521 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:56:21.742501 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:56:21.750030 kubelet[2129]: I0209 09:56:21.750013 2129 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:56:21.748000 audit[2129]: AVC avc: denied { mac_admin } for pid=2129 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.754297 kubelet[2129]: I0209 09:56:21.753068 2129 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:56:21.754297 kubelet[2129]: I0209 09:56:21.753259 2129 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:56:21.754297 kubelet[2129]: E0209 09:56:21.754017 2129 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-08b227d6a8\" not found" Feb 9 09:56:21.756032 kernel: kauditd_printk_skb: 213 callbacks suppressed Feb 9 09:56:21.756085 kernel: audit: type=1400 audit(1707472581.748:584): avc: denied { mac_admin } for pid=2129 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:21.748000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:21.780412 kubelet[2129]: I0209 09:56:21.780375 2129 topology_manager.go:215] "Topology Admit Handler" podUID="abb3bdb520c806402a1b942d451d507d" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.782199 kubelet[2129]: I0209 09:56:21.782178 2129 topology_manager.go:215] "Topology Admit Handler" podUID="86aba46eed8c1e5421e9034fcd60c385" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.783643 kernel: audit: type=1401 audit(1707472581.748:584): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:21.783738 kernel: audit: type=1300 audit(1707472581.748:584): arch=c00000b7 syscall=5 success=no exit=-22 a0=400093b170 a1=40008cfd28 a2=400093b140 a3=25 items=0 ppid=1 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.748000 audit[2129]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400093b170 a1=40008cfd28 a2=400093b140 a3=25 items=0 ppid=1 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:21.784439 kubelet[2129]: I0209 09:56:21.784418 2129 topology_manager.go:215] "Topology Admit Handler" podUID="2730f8b6fee3620e93b9be44043857b0" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.789636 systemd[1]: Created slice kubepods-burstable-podabb3bdb520c806402a1b942d451d507d.slice. Feb 9 09:56:21.748000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:21.834110 kernel: audit: type=1327 audit(1707472581.748:584): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:21.834500 kubelet[2129]: I0209 09:56:21.834470 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834582 kubelet[2129]: I0209 09:56:21.834511 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834582 kubelet[2129]: I0209 09:56:21.834535 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834582 kubelet[2129]: I0209 09:56:21.834557 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834582 kubelet[2129]: I0209 09:56:21.834578 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834685 kubelet[2129]: I0209 09:56:21.834595 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/abb3bdb520c806402a1b942d451d507d-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-08b227d6a8\" (UID: \"abb3bdb520c806402a1b942d451d507d\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834685 kubelet[2129]: I0209 09:56:21.834613 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834685 kubelet[2129]: I0209 09:56:21.834632 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.834685 kubelet[2129]: I0209 09:56:21.834651 2129 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.836090 kubelet[2129]: E0209 09:56:21.836055 2129 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="400ms" Feb 9 09:56:21.840171 systemd[1]: Created slice kubepods-burstable-pod86aba46eed8c1e5421e9034fcd60c385.slice. Feb 9 09:56:21.844867 systemd[1]: Created slice kubepods-burstable-pod2730f8b6fee3620e93b9be44043857b0.slice. Feb 9 09:56:21.941399 kubelet[2129]: I0209 09:56:21.938987 2129 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:21.941854 kubelet[2129]: E0209 09:56:21.941837 2129 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:22.138742 env[1354]: time="2024-02-09T09:56:22.138459520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-08b227d6a8,Uid:abb3bdb520c806402a1b942d451d507d,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:22.143740 env[1354]: time="2024-02-09T09:56:22.143708672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-08b227d6a8,Uid:86aba46eed8c1e5421e9034fcd60c385,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:22.147950 env[1354]: time="2024-02-09T09:56:22.147636505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-08b227d6a8,Uid:2730f8b6fee3620e93b9be44043857b0,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:22.237769 kubelet[2129]: E0209 09:56:22.236774 2129 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="800ms" Feb 9 09:56:22.343658 kubelet[2129]: I0209 09:56:22.343627 2129 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:22.343938 kubelet[2129]: E0209 09:56:22.343921 2129 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:22.510797 kubelet[2129]: W0209 09:56:22.510757 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.510797 kubelet[2129]: E0209 09:56:22.510804 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.665734 kubelet[2129]: W0209 09:56:22.665672 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.665734 kubelet[2129]: E0209 09:56:22.665738 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.690871 kubelet[2129]: W0209 09:56:22.690811 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-08b227d6a8&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.690871 kubelet[2129]: E0209 09:56:22.690875 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-08b227d6a8&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:22.828265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3180916095.mount: Deactivated successfully. Feb 9 09:56:22.866355 env[1354]: time="2024-02-09T09:56:22.866295360Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.872244 env[1354]: time="2024-02-09T09:56:22.872191830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.886444 env[1354]: time="2024-02-09T09:56:22.886404274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.890530 env[1354]: time="2024-02-09T09:56:22.890493357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.897354 env[1354]: time="2024-02-09T09:56:22.897297842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.901354 env[1354]: time="2024-02-09T09:56:22.901291799Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.906407 env[1354]: time="2024-02-09T09:56:22.906378621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.909458 env[1354]: time="2024-02-09T09:56:22.909423522Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.918293 env[1354]: time="2024-02-09T09:56:22.918256007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.923811 env[1354]: time="2024-02-09T09:56:22.923777175Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.940902 env[1354]: time="2024-02-09T09:56:22.940867670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:22.955711 env[1354]: time="2024-02-09T09:56:22.955676190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:23.006062 env[1354]: time="2024-02-09T09:56:23.005882846Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:23.006062 env[1354]: time="2024-02-09T09:56:23.005921889Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:23.006062 env[1354]: time="2024-02-09T09:56:23.005932649Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:23.010664 env[1354]: time="2024-02-09T09:56:23.006075138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e pid=2168 runtime=io.containerd.runc.v2 Feb 9 09:56:23.021661 systemd[1]: Started cri-containerd-dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e.scope. Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053731 kubelet[2129]: E0209 09:56:23.053690 2129 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="1.6s" Feb 9 09:56:23.053825 env[1354]: time="2024-02-09T09:56:23.053700183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:23.053825 env[1354]: time="2024-02-09T09:56:23.053807229Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:23.053888 env[1354]: time="2024-02-09T09:56:23.053833711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:23.054003 env[1354]: time="2024-02-09T09:56:23.053966358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795 pid=2211 runtime=io.containerd.runc.v2 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.079091 kernel: audit: type=1400 audit(1707472583.034:585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.079198 kernel: audit: type=1400 audit(1707472583.034:586): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.099087 kernel: audit: type=1400 audit(1707472583.034:587): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.104692 env[1354]: time="2024-02-09T09:56:23.104498132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:23.104692 env[1354]: time="2024-02-09T09:56:23.104549695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:23.104692 env[1354]: time="2024-02-09T09:56:23.104560856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:23.104981 env[1354]: time="2024-02-09T09:56:23.104920437Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29e85012904e1d4a5cd1f8dab8de8eccc5f767d817454ea902cc79f9bfba03af pid=2195 runtime=io.containerd.runc.v2 Feb 9 09:56:23.120906 kernel: audit: type=1400 audit(1707472583.034:588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.127235 kubelet[2129]: W0209 09:56:23.127154 2129 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:23.127235 kubelet[2129]: E0209 09:56:23.127212 2129 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:23.141854 kernel: audit: type=1400 audit(1707472583.034:589): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160316 kernel: audit: type=1400 audit(1707472583.034:590): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.161798 kubelet[2129]: I0209 09:56:23.161773 2129 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:23.162148 kubelet[2129]: E0209 09:56:23.162129 2129 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.052000 audit: BPF prog-id=65 op=LOAD Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663938383463323361343038326336633536326664343066616663 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663938383463323361343038326336633536326664343066616663 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit: BPF prog-id=66 op=LOAD Feb 9 09:56:23.053000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663938383463323361343038326336633536326664343066616663 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit: BPF prog-id=67 op=LOAD Feb 9 09:56:23.053000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663938383463323361343038326336633536326664343066616663 Feb 9 09:56:23.053000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:56:23.053000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.053000 audit: BPF prog-id=68 op=LOAD Feb 9 09:56:23.053000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2168 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663938383463323361343038326336633536326664343066616663 Feb 9 09:56:23.171164 systemd[1]: Started cri-containerd-29e85012904e1d4a5cd1f8dab8de8eccc5f767d817454ea902cc79f9bfba03af.scope. Feb 9 09:56:23.173765 systemd[1]: Started cri-containerd-f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795.scope. Feb 9 09:56:23.183205 env[1354]: time="2024-02-09T09:56:23.183153819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-08b227d6a8,Uid:abb3bdb520c806402a1b942d451d507d,Namespace:kube-system,Attempt:0,} returns sandbox id \"dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e\"" Feb 9 09:56:23.191645 env[1354]: time="2024-02-09T09:56:23.191599310Z" level=info msg="CreateContainer within sandbox \"dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.193000 audit: BPF prog-id=69 op=LOAD Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2195 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239653835303132393034653164346135636431663864616238646538 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2195 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239653835303132393034653164346135636431663864616238646538 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit: BPF prog-id=70 op=LOAD Feb 9 09:56:23.194000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2195 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239653835303132393034653164346135636431663864616238646538 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit: BPF prog-id=71 op=LOAD Feb 9 09:56:23.194000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2195 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239653835303132393034653164346135636431663864616238646538 Feb 9 09:56:23.194000 audit: BPF prog-id=71 op=UNLOAD Feb 9 09:56:23.194000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.194000 audit: BPF prog-id=72 op=LOAD Feb 9 09:56:23.194000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2195 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239653835303132393034653164346135636431663864616238646538 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.200000 audit: BPF prog-id=73 op=LOAD Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2211 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373430333434393636666530663965306564653835333165373231 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2211 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373430333434393636666530663965306564653835333165373231 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit: BPF prog-id=74 op=LOAD Feb 9 09:56:23.201000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2211 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373430333434393636666530663965306564653835333165373231 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.201000 audit: BPF prog-id=75 op=LOAD Feb 9 09:56:23.201000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2211 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373430333434393636666530663965306564653835333165373231 Feb 9 09:56:23.202000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:56:23.202000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.202000 audit: BPF prog-id=76 op=LOAD Feb 9 09:56:23.202000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2211 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373430333434393636666530663965306564653835333165373231 Feb 9 09:56:23.220108 env[1354]: time="2024-02-09T09:56:23.220065043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-08b227d6a8,Uid:86aba46eed8c1e5421e9034fcd60c385,Namespace:kube-system,Attempt:0,} returns sandbox id \"29e85012904e1d4a5cd1f8dab8de8eccc5f767d817454ea902cc79f9bfba03af\"" Feb 9 09:56:23.222940 env[1354]: time="2024-02-09T09:56:23.222910448Z" level=info msg="CreateContainer within sandbox \"29e85012904e1d4a5cd1f8dab8de8eccc5f767d817454ea902cc79f9bfba03af\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 09:56:23.233176 env[1354]: time="2024-02-09T09:56:23.233142802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-08b227d6a8,Uid:2730f8b6fee3620e93b9be44043857b0,Namespace:kube-system,Attempt:0,} returns sandbox id \"f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795\"" Feb 9 09:56:23.235712 env[1354]: time="2024-02-09T09:56:23.235684389Z" level=info msg="CreateContainer within sandbox \"f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 09:56:23.235995 env[1354]: time="2024-02-09T09:56:23.235972566Z" level=info msg="CreateContainer within sandbox \"dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407\"" Feb 9 09:56:23.236712 env[1354]: time="2024-02-09T09:56:23.236690088Z" level=info msg="StartContainer for \"7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407\"" Feb 9 09:56:23.252843 systemd[1]: Started cri-containerd-7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407.scope. Feb 9 09:56:23.263647 env[1354]: time="2024-02-09T09:56:23.263588010Z" level=info msg="CreateContainer within sandbox \"29e85012904e1d4a5cd1f8dab8de8eccc5f767d817454ea902cc79f9bfba03af\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0a56fc688ec650e700fe002254846c505b87c1612b073593008b7c25c6fbdb07\"" Feb 9 09:56:23.264242 env[1354]: time="2024-02-09T09:56:23.264219006Z" level=info msg="StartContainer for \"0a56fc688ec650e700fe002254846c505b87c1612b073593008b7c25c6fbdb07\"" Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.266000 audit: BPF prog-id=77 op=LOAD Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2168 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633537303363356336643832353830303734356362356534613666 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2168 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633537303363356336643832353830303734356362356534613666 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.267000 audit: BPF prog-id=78 op=LOAD Feb 9 09:56:23.267000 audit[2298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2168 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633537303363356336643832353830303734356362356534613666 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.268000 audit: BPF prog-id=79 op=LOAD Feb 9 09:56:23.268000 audit[2298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2168 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633537303363356336643832353830303734356362356534613666 Feb 9 09:56:23.268000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:56:23.269000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.269000 audit: BPF prog-id=80 op=LOAD Feb 9 09:56:23.269000 audit[2298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2168 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633537303363356336643832353830303734356362356534613666 Feb 9 09:56:23.280604 env[1354]: time="2024-02-09T09:56:23.280548354Z" level=info msg="CreateContainer within sandbox \"f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494\"" Feb 9 09:56:23.281243 env[1354]: time="2024-02-09T09:56:23.281206273Z" level=info msg="StartContainer for \"24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494\"" Feb 9 09:56:23.290423 systemd[1]: Started cri-containerd-0a56fc688ec650e700fe002254846c505b87c1612b073593008b7c25c6fbdb07.scope. Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.303000 audit: BPF prog-id=81 op=LOAD Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000227b38 a2=10 a3=0 items=0 ppid=2195 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353666633638386563363530653730306665303032323534383436 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002275a0 a2=3c a3=0 items=0 ppid=2195 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353666633638386563363530653730306665303032323534383436 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.304000 audit: BPF prog-id=82 op=LOAD Feb 9 09:56:23.304000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002278e0 a2=78 a3=0 items=0 ppid=2195 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353666633638386563363530653730306665303032323534383436 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit: BPF prog-id=83 op=LOAD Feb 9 09:56:23.305000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000227670 a2=78 a3=0 items=0 ppid=2195 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353666633638386563363530653730306665303032323534383436 Feb 9 09:56:23.305000 audit: BPF prog-id=83 op=UNLOAD Feb 9 09:56:23.305000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.305000 audit: BPF prog-id=84 op=LOAD Feb 9 09:56:23.305000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000227b40 a2=78 a3=0 items=0 ppid=2195 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061353666633638386563363530653730306665303032323534383436 Feb 9 09:56:23.322189 env[1354]: time="2024-02-09T09:56:23.322148490Z" level=info msg="StartContainer for \"7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407\" returns successfully" Feb 9 09:56:23.324056 systemd[1]: Started cri-containerd-24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494.scope. Feb 9 09:56:23.346226 env[1354]: time="2024-02-09T09:56:23.346188486Z" level=info msg="StartContainer for \"0a56fc688ec650e700fe002254846c505b87c1612b073593008b7c25c6fbdb07\" returns successfully" Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.346000 audit: BPF prog-id=85 op=LOAD Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2211 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663935393962326337346638356463623339623933316264326337 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2211 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663935393962326337346638356463623339623933316264326337 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit: BPF prog-id=86 op=LOAD Feb 9 09:56:23.347000 audit[2342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2211 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663935393962326337346638356463623339623933316264326337 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit: BPF prog-id=87 op=LOAD Feb 9 09:56:23.347000 audit[2342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2211 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663935393962326337346638356463623339623933316264326337 Feb 9 09:56:23.347000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:56:23.347000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.347000 audit: BPF prog-id=88 op=LOAD Feb 9 09:56:23.347000 audit[2342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2211 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663935393962326337346638356463623339623933316264326337 Feb 9 09:56:23.379432 env[1354]: time="2024-02-09T09:56:23.379387933Z" level=info msg="StartContainer for \"24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494\" returns successfully" Feb 9 09:56:23.720605 kubelet[2129]: E0209 09:56:23.720510 2129 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 09:56:24.764066 kubelet[2129]: I0209 09:56:24.764012 2129 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:25.732000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.732000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400013a810 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:25.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:25.732000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.732000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004103c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:25.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:25.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.869000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4007c83bf0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.869000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4006807ec0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4002b11c20 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.871000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=400759e030 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.873000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.873000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40078849a0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.874000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:25.874000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=400759fa10 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:56:25.874000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:56:25.953514 kubelet[2129]: E0209 09:56:25.953488 2129 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-08b227d6a8\" not found" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:26.045711 kubelet[2129]: I0209 09:56:26.045682 2129 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:26.623829 kubelet[2129]: I0209 09:56:26.623791 2129 apiserver.go:52] "Watching apiserver" Feb 9 09:56:26.634929 kubelet[2129]: I0209 09:56:26.634897 2129 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:56:27.522896 kubelet[2129]: W0209 09:56:27.522869 2129 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:56:29.153828 systemd[1]: Reloading. Feb 9 09:56:29.236654 /usr/lib/systemd/system-generators/torcx-generator[2418]: time="2024-02-09T09:56:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:56:29.236687 /usr/lib/systemd/system-generators/torcx-generator[2418]: time="2024-02-09T09:56:29Z" level=info msg="torcx already run" Feb 9 09:56:29.311373 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:56:29.311546 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:56:29.326859 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.417932 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 9 09:56:29.418035 kernel: audit: type=1400 audit(1707472589.412:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.457635 kernel: audit: type=1400 audit(1707472589.412:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.459563 kubelet[2129]: W0209 09:56:29.458793 2129 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:56:29.477186 kernel: audit: type=1400 audit(1707472589.412:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.482731 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:56:29.482820 kernel: audit: type=1400 audit(1707472589.412:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.508369 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:56:29.508455 kernel: audit: type=1400 audit(1707472589.412:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.531689 kernel: audit: backlog limit exceeded Feb 9 09:56:29.531790 kernel: audit: type=1400 audit(1707472589.412:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.552373 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.417000 audit: BPF prog-id=89 op=LOAD Feb 9 09:56:29.417000 audit: BPF prog-id=50 op=UNLOAD Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.435000 audit: BPF prog-id=90 op=LOAD Feb 9 09:56:29.435000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:56:29.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.437000 audit: BPF prog-id=91 op=LOAD Feb 9 09:56:29.437000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.438000 audit: BPF prog-id=92 op=LOAD Feb 9 09:56:29.438000 audit: BPF prog-id=51 op=UNLOAD Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.457000 audit: BPF prog-id=93 op=LOAD Feb 9 09:56:29.457000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.531000 audit: BPF prog-id=94 op=LOAD Feb 9 09:56:29.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.559000 audit: BPF prog-id=95 op=LOAD Feb 9 09:56:29.559000 audit: BPF prog-id=52 op=UNLOAD Feb 9 09:56:29.559000 audit: BPF prog-id=53 op=UNLOAD Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit: BPF prog-id=96 op=LOAD Feb 9 09:56:29.560000 audit: BPF prog-id=54 op=UNLOAD Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit: BPF prog-id=97 op=LOAD Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.560000 audit: BPF prog-id=98 op=LOAD Feb 9 09:56:29.560000 audit: BPF prog-id=55 op=UNLOAD Feb 9 09:56:29.560000 audit: BPF prog-id=56 op=UNLOAD Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit: BPF prog-id=99 op=LOAD Feb 9 09:56:29.561000 audit: BPF prog-id=57 op=UNLOAD Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit: BPF prog-id=100 op=LOAD Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.561000 audit: BPF prog-id=101 op=LOAD Feb 9 09:56:29.561000 audit: BPF prog-id=58 op=UNLOAD Feb 9 09:56:29.561000 audit: BPF prog-id=59 op=UNLOAD Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit: BPF prog-id=102 op=LOAD Feb 9 09:56:29.562000 audit: BPF prog-id=77 op=UNLOAD Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.562000 audit: BPF prog-id=103 op=LOAD Feb 9 09:56:29.563000 audit: BPF prog-id=60 op=UNLOAD Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit: BPF prog-id=104 op=LOAD Feb 9 09:56:29.564000 audit: BPF prog-id=61 op=UNLOAD Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit: BPF prog-id=105 op=LOAD Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit: BPF prog-id=106 op=LOAD Feb 9 09:56:29.564000 audit: BPF prog-id=62 op=UNLOAD Feb 9 09:56:29.564000 audit: BPF prog-id=63 op=UNLOAD Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.565000 audit: BPF prog-id=107 op=LOAD Feb 9 09:56:29.565000 audit: BPF prog-id=64 op=UNLOAD Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.566000 audit: BPF prog-id=108 op=LOAD Feb 9 09:56:29.566000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.569000 audit: BPF prog-id=109 op=LOAD Feb 9 09:56:29.569000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:56:29.581414 systemd[1]: Stopping kubelet.service... Feb 9 09:56:29.605704 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 09:56:29.605890 systemd[1]: Stopped kubelet.service. Feb 9 09:56:29.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:29.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:29.607665 systemd[1]: Started kubelet.service. Feb 9 09:56:29.684420 kubelet[2478]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:29.686321 kubelet[2478]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:56:29.686321 kubelet[2478]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:29.686452 kubelet[2478]: I0209 09:56:29.686385 2478 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:56:29.694936 kubelet[2478]: I0209 09:56:29.694907 2478 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 09:56:29.694936 kubelet[2478]: I0209 09:56:29.694933 2478 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:56:29.695117 kubelet[2478]: I0209 09:56:29.695098 2478 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 09:56:29.696599 kubelet[2478]: I0209 09:56:29.696579 2478 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 09:56:29.698758 kubelet[2478]: I0209 09:56:29.698602 2478 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:56:29.702642 kubelet[2478]: W0209 09:56:29.702620 2478 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:56:29.703765 kubelet[2478]: I0209 09:56:29.703186 2478 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:56:29.703765 kubelet[2478]: I0209 09:56:29.703412 2478 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:56:29.703765 kubelet[2478]: I0209 09:56:29.703547 2478 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 09:56:29.703765 kubelet[2478]: I0209 09:56:29.703565 2478 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 09:56:29.703765 kubelet[2478]: I0209 09:56:29.703573 2478 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 09:56:29.706766 kubelet[2478]: I0209 09:56:29.703598 2478 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:29.706766 kubelet[2478]: I0209 09:56:29.705101 2478 kubelet.go:393] "Attempting to sync node with API server" Feb 9 09:56:29.706766 kubelet[2478]: I0209 09:56:29.705119 2478 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:56:29.713996 kubelet[2478]: I0209 09:56:29.705135 2478 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:56:29.714093 kubelet[2478]: I0209 09:56:29.714001 2478 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:56:29.717998 kubelet[2478]: I0209 09:56:29.717981 2478 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:56:29.718614 kubelet[2478]: I0209 09:56:29.718598 2478 server.go:1232] "Started kubelet" Feb 9 09:56:29.725000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:29.725000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cdf680 a1=4000ae0c48 a2=4000cdf650 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:29.725000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:29.726549 kubelet[2478]: I0209 09:56:29.726534 2478 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:56:29.730000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.730000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:29.730000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cfac00 a1=4000ae0c60 a2=4000cdf710 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:29.730000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:29.730813 kubelet[2478]: I0209 09:56:29.730795 2478 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:56:29.731675 kubelet[2478]: I0209 09:56:29.731657 2478 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:56:29.735053 kubelet[2478]: E0209 09:56:29.732183 2478 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:56:29.735053 kubelet[2478]: E0209 09:56:29.732215 2478 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:56:29.735053 kubelet[2478]: I0209 09:56:29.734282 2478 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:56:29.735053 kubelet[2478]: I0209 09:56:29.734948 2478 server.go:462] "Adding debug handlers to kubelet server" Feb 9 09:56:29.736123 kubelet[2478]: I0209 09:56:29.735924 2478 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:56:29.736123 kubelet[2478]: I0209 09:56:29.736081 2478 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 09:56:29.736683 kubelet[2478]: I0209 09:56:29.736640 2478 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 09:56:29.737456 kubelet[2478]: I0209 09:56:29.736774 2478 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:56:29.737456 kubelet[2478]: I0209 09:56:29.736905 2478 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 09:56:29.749921 kubelet[2478]: I0209 09:56:29.749888 2478 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 09:56:29.750727 kubelet[2478]: I0209 09:56:29.750705 2478 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 09:56:29.750778 kubelet[2478]: I0209 09:56:29.750735 2478 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 09:56:29.750778 kubelet[2478]: I0209 09:56:29.750753 2478 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 09:56:29.750827 kubelet[2478]: E0209 09:56:29.750798 2478 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:56:29.802937 kubelet[2478]: I0209 09:56:29.802912 2478 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:56:29.803146 kubelet[2478]: I0209 09:56:29.803137 2478 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:56:29.803238 kubelet[2478]: I0209 09:56:29.803228 2478 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:29.803458 kubelet[2478]: I0209 09:56:29.803446 2478 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 09:56:29.803560 kubelet[2478]: I0209 09:56:29.803550 2478 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 09:56:29.803617 kubelet[2478]: I0209 09:56:29.803608 2478 policy_none.go:49] "None policy: Start" Feb 9 09:56:29.804281 kubelet[2478]: I0209 09:56:29.804261 2478 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:56:29.804412 kubelet[2478]: I0209 09:56:29.804354 2478 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:56:29.804499 kubelet[2478]: I0209 09:56:29.804477 2478 state_mem.go:75] "Updated machine memory state" Feb 9 09:56:29.810000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:29.810000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:29.810000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000eb28d0 a1=40010bd3b0 a2=4000eb2870 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:29.810000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:29.811484 kubelet[2478]: I0209 09:56:29.810563 2478 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:56:29.811484 kubelet[2478]: I0209 09:56:29.810665 2478 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:56:29.811484 kubelet[2478]: I0209 09:56:29.810897 2478 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:56:29.839560 kubelet[2478]: I0209 09:56:29.839535 2478 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.851207 kubelet[2478]: I0209 09:56:29.851176 2478 topology_manager.go:215] "Topology Admit Handler" podUID="86aba46eed8c1e5421e9034fcd60c385" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.851477 kubelet[2478]: I0209 09:56:29.851462 2478 topology_manager.go:215] "Topology Admit Handler" podUID="2730f8b6fee3620e93b9be44043857b0" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.851577 kubelet[2478]: I0209 09:56:29.851566 2478 topology_manager.go:215] "Topology Admit Handler" podUID="abb3bdb520c806402a1b942d451d507d" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.860637 kubelet[2478]: W0209 09:56:29.860615 2478 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:56:29.861034 kubelet[2478]: I0209 09:56:29.860890 2478 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.861184 kubelet[2478]: I0209 09:56:29.861174 2478 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.875942 kubelet[2478]: W0209 09:56:29.875826 2478 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:56:29.875942 kubelet[2478]: E0209 09:56:29.875917 2478 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.889733 kubelet[2478]: W0209 09:56:29.889707 2478 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:56:29.889934 kubelet[2478]: E0209 09:56:29.889921 2478 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-08b227d6a8\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.938420 kubelet[2478]: I0209 09:56:29.938318 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.938639 kubelet[2478]: I0209 09:56:29.938626 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.938742 kubelet[2478]: I0209 09:56:29.938732 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.938837 kubelet[2478]: I0209 09:56:29.938828 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.938926 kubelet[2478]: I0209 09:56:29.938917 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/abb3bdb520c806402a1b942d451d507d-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-08b227d6a8\" (UID: \"abb3bdb520c806402a1b942d451d507d\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.939015 kubelet[2478]: I0209 09:56:29.939005 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.939113 kubelet[2478]: I0209 09:56:29.939103 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/86aba46eed8c1e5421e9034fcd60c385-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-08b227d6a8\" (UID: \"86aba46eed8c1e5421e9034fcd60c385\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.939206 kubelet[2478]: I0209 09:56:29.939196 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:29.939296 kubelet[2478]: I0209 09:56:29.939287 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2730f8b6fee3620e93b9be44043857b0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-08b227d6a8\" (UID: \"2730f8b6fee3620e93b9be44043857b0\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" Feb 9 09:56:30.295000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:30.295000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400101e8a0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:30.295000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:30.297000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:30.297000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117fa40 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:30.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:30.298000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:30.298000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400117fb60 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:30.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:30.295000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400117f920 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:30.717439 kubelet[2478]: I0209 09:56:30.717326 2478 apiserver.go:52] "Watching apiserver" Feb 9 09:56:30.737785 kubelet[2478]: I0209 09:56:30.737753 2478 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:56:30.860823 kubelet[2478]: I0209 09:56:30.860793 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-08b227d6a8" podStartSLOduration=3.860734468 podCreationTimestamp="2024-02-09 09:56:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:30.831762827 +0000 UTC m=+1.218561203" watchObservedRunningTime="2024-02-09 09:56:30.860734468 +0000 UTC m=+1.247532844" Feb 9 09:56:30.861043 kubelet[2478]: I0209 09:56:30.861030 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-08b227d6a8" podStartSLOduration=1.861009482 podCreationTimestamp="2024-02-09 09:56:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:30.854396073 +0000 UTC m=+1.241194409" watchObservedRunningTime="2024-02-09 09:56:30.861009482 +0000 UTC m=+1.247807818" Feb 9 09:56:30.929194 kubelet[2478]: I0209 09:56:30.929163 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-08b227d6a8" podStartSLOduration=1.9291270310000002 podCreationTimestamp="2024-02-09 09:56:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:30.892903149 +0000 UTC m=+1.279701525" watchObservedRunningTime="2024-02-09 09:56:30.929127031 +0000 UTC m=+1.315925407" Feb 9 09:56:31.582000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521031 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 09:56:31.582000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000871780 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:56:31.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:34.933579 sudo[1722]: pam_unix(sudo:session): session closed for user root Feb 9 09:56:34.933000 audit[1722]: USER_END pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:34.939569 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 9 09:56:34.939649 kernel: audit: type=1106 audit(1707472594.933:953): pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:34.933000 audit[1722]: CRED_DISP pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:34.983635 kernel: audit: type=1104 audit(1707472594.933:954): pid=1722 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:34.994149 sshd[1719]: pam_unix(sshd:session): session closed for user core Feb 9 09:56:34.993000 audit[1719]: USER_END pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:34.993000 audit[1719]: CRED_DISP pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:35.025402 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:56:35.025635 systemd[1]: session-9.scope: Consumed 6.526s CPU time. Feb 9 09:56:35.026522 systemd[1]: sshd@6-10.200.20.4:22-10.200.12.6:46666.service: Deactivated successfully. Feb 9 09:56:35.047067 kernel: audit: type=1106 audit(1707472594.993:955): pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:35.047270 kernel: audit: type=1104 audit(1707472594.993:956): pid=1719 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:35.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:46666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:35.070257 kernel: audit: type=1131 audit(1707472595.025:957): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:46666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:35.070921 systemd-logind[1340]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:56:35.071941 systemd-logind[1340]: Removed session 9. Feb 9 09:56:43.382045 kubelet[2478]: I0209 09:56:43.382020 2478 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 09:56:43.382911 env[1354]: time="2024-02-09T09:56:43.382870698Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:56:43.383374 kubelet[2478]: I0209 09:56:43.383356 2478 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 09:56:44.077013 kubelet[2478]: I0209 09:56:44.076978 2478 topology_manager.go:215] "Topology Admit Handler" podUID="0647ca50-fe57-4467-a8a3-44fb798218bc" podNamespace="kube-system" podName="kube-proxy-tfht7" Feb 9 09:56:44.082031 systemd[1]: Created slice kubepods-besteffort-pod0647ca50_fe57_4467_a8a3_44fb798218bc.slice. Feb 9 09:56:44.194071 kubelet[2478]: I0209 09:56:44.194028 2478 topology_manager.go:215] "Topology Admit Handler" podUID="ddfaf2d5-fb68-4257-ba38-82c87c611a68" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-sswx8" Feb 9 09:56:44.199598 systemd[1]: Created slice kubepods-besteffort-podddfaf2d5_fb68_4257_ba38_82c87c611a68.slice. Feb 9 09:56:44.215579 kubelet[2478]: I0209 09:56:44.215547 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0647ca50-fe57-4467-a8a3-44fb798218bc-kube-proxy\") pod \"kube-proxy-tfht7\" (UID: \"0647ca50-fe57-4467-a8a3-44fb798218bc\") " pod="kube-system/kube-proxy-tfht7" Feb 9 09:56:44.215827 kubelet[2478]: I0209 09:56:44.215790 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0647ca50-fe57-4467-a8a3-44fb798218bc-lib-modules\") pod \"kube-proxy-tfht7\" (UID: \"0647ca50-fe57-4467-a8a3-44fb798218bc\") " pod="kube-system/kube-proxy-tfht7" Feb 9 09:56:44.215879 kubelet[2478]: I0209 09:56:44.215835 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnnrw\" (UniqueName: \"kubernetes.io/projected/0647ca50-fe57-4467-a8a3-44fb798218bc-kube-api-access-xnnrw\") pod \"kube-proxy-tfht7\" (UID: \"0647ca50-fe57-4467-a8a3-44fb798218bc\") " pod="kube-system/kube-proxy-tfht7" Feb 9 09:56:44.215879 kubelet[2478]: I0209 09:56:44.215871 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0647ca50-fe57-4467-a8a3-44fb798218bc-xtables-lock\") pod \"kube-proxy-tfht7\" (UID: \"0647ca50-fe57-4467-a8a3-44fb798218bc\") " pod="kube-system/kube-proxy-tfht7" Feb 9 09:56:44.316783 kubelet[2478]: I0209 09:56:44.316751 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ddfaf2d5-fb68-4257-ba38-82c87c611a68-var-lib-calico\") pod \"tigera-operator-55585899bf-sswx8\" (UID: \"ddfaf2d5-fb68-4257-ba38-82c87c611a68\") " pod="tigera-operator/tigera-operator-55585899bf-sswx8" Feb 9 09:56:44.317036 kubelet[2478]: I0209 09:56:44.317020 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fkn2l\" (UniqueName: \"kubernetes.io/projected/ddfaf2d5-fb68-4257-ba38-82c87c611a68-kube-api-access-fkn2l\") pod \"tigera-operator-55585899bf-sswx8\" (UID: \"ddfaf2d5-fb68-4257-ba38-82c87c611a68\") " pod="tigera-operator/tigera-operator-55585899bf-sswx8" Feb 9 09:56:44.391446 env[1354]: time="2024-02-09T09:56:44.391002519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tfht7,Uid:0647ca50-fe57-4467-a8a3-44fb798218bc,Namespace:kube-system,Attempt:0,}" Feb 9 09:56:44.432636 env[1354]: time="2024-02-09T09:56:44.432563928Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:44.432840 env[1354]: time="2024-02-09T09:56:44.432816498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:44.433092 env[1354]: time="2024-02-09T09:56:44.433057027Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:44.433353 env[1354]: time="2024-02-09T09:56:44.433322197Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903 pid=2562 runtime=io.containerd.runc.v2 Feb 9 09:56:44.451339 systemd[1]: Started cri-containerd-b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903.scope. Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502954 kernel: audit: type=1400 audit(1707472604.460:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.503079 kernel: audit: type=1400 audit(1707472604.460:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.511821 env[1354]: time="2024-02-09T09:56:44.511783880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-sswx8,Uid:ddfaf2d5-fb68-4257-ba38-82c87c611a68,Namespace:tigera-operator,Attempt:0,}" Feb 9 09:56:44.530724 kernel: audit: type=1400 audit(1707472604.460:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.552742 kernel: audit: type=1400 audit(1707472604.460:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.584530 kernel: audit: type=1400 audit(1707472604.460:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.604900 kernel: audit: type=1400 audit(1707472604.460:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.625615 kernel: audit: type=1400 audit(1707472604.460:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.646516 kernel: audit: type=1400 audit(1707472604.460:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.647150 env[1354]: time="2024-02-09T09:56:44.647093831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tfht7,Uid:0647ca50-fe57-4467-a8a3-44fb798218bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903\"" Feb 9 09:56:44.651421 env[1354]: time="2024-02-09T09:56:44.650280751Z" level=info msg="CreateContainer within sandbox \"b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:56:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.671302 kernel: audit: type=1400 audit(1707472604.460:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.671455 kernel: audit: type=1400 audit(1707472604.480:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit: BPF prog-id=110 op=LOAD Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2562 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231653966373432323961626534393336613266363434363362646465 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2562 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231653966373432323961626534393336613266363434363362646465 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.480000 audit: BPF prog-id=111 op=LOAD Feb 9 09:56:44.480000 audit[2573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2562 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231653966373432323961626534393336613266363434363362646465 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit: BPF prog-id=112 op=LOAD Feb 9 09:56:44.502000 audit[2573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2562 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231653966373432323961626534393336613266363434363362646465 Feb 9 09:56:44.502000 audit: BPF prog-id=112 op=UNLOAD Feb 9 09:56:44.502000 audit: BPF prog-id=111 op=UNLOAD Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.502000 audit: BPF prog-id=113 op=LOAD Feb 9 09:56:44.502000 audit[2573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2562 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231653966373432323961626534393336613266363434363362646465 Feb 9 09:56:44.728945 env[1354]: time="2024-02-09T09:56:44.723593800Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:44.728945 env[1354]: time="2024-02-09T09:56:44.723645682Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:44.728945 env[1354]: time="2024-02-09T09:56:44.723656242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:44.728945 env[1354]: time="2024-02-09T09:56:44.723855130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e pid=2604 runtime=io.containerd.runc.v2 Feb 9 09:56:44.740414 env[1354]: time="2024-02-09T09:56:44.740359193Z" level=info msg="CreateContainer within sandbox \"b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3af14be5ae01ba5b02b95b6f1287204e051bc71cfd78214550ae16e7b0e35884\"" Feb 9 09:56:44.744703 systemd[1]: Started cri-containerd-badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e.scope. Feb 9 09:56:44.746996 env[1354]: time="2024-02-09T09:56:44.746959522Z" level=info msg="StartContainer for \"3af14be5ae01ba5b02b95b6f1287204e051bc71cfd78214550ae16e7b0e35884\"" Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.757000 audit: BPF prog-id=114 op=LOAD Feb 9 09:56:44.757000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.757000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646339376461376466373238356236396365633530303764656266 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646339376461376466373238356236396365633530303764656266 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit: BPF prog-id=115 op=LOAD Feb 9 09:56:44.758000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646339376461376466373238356236396365633530303764656266 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit: BPF prog-id=116 op=LOAD Feb 9 09:56:44.758000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646339376461376466373238356236396365633530303764656266 Feb 9 09:56:44.758000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:56:44.758000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.758000 audit: BPF prog-id=117 op=LOAD Feb 9 09:56:44.758000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2604 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646339376461376466373238356236396365633530303764656266 Feb 9 09:56:44.775670 systemd[1]: Started cri-containerd-3af14be5ae01ba5b02b95b6f1287204e051bc71cfd78214550ae16e7b0e35884.scope. Feb 9 09:56:44.788382 env[1354]: time="2024-02-09T09:56:44.788334405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-sswx8,Uid:ddfaf2d5-fb68-4257-ba38-82c87c611a68,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e\"" Feb 9 09:56:44.791961 env[1354]: time="2024-02-09T09:56:44.790835939Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2562 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663134626535616530316261356230326239356236663132383732 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit: BPF prog-id=118 op=LOAD Feb 9 09:56:44.802000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2562 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663134626535616530316261356230326239356236663132383732 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit: BPF prog-id=119 op=LOAD Feb 9 09:56:44.802000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2562 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663134626535616530316261356230326239356236663132383732 Feb 9 09:56:44.802000 audit: BPF prog-id=119 op=UNLOAD Feb 9 09:56:44.802000 audit: BPF prog-id=118 op=UNLOAD Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:44.802000 audit: BPF prog-id=120 op=LOAD Feb 9 09:56:44.802000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2562 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663134626535616530316261356230326239356236663132383732 Feb 9 09:56:44.831718 env[1354]: time="2024-02-09T09:56:44.831669361Z" level=info msg="StartContainer for \"3af14be5ae01ba5b02b95b6f1287204e051bc71cfd78214550ae16e7b0e35884\" returns successfully" Feb 9 09:56:44.883000 audit[2695]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.883000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0c3c8d0 a2=0 a3=ffffb04fd6c0 items=0 ppid=2654 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:56:44.885000 audit[2696]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:44.885000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff41528d0 a2=0 a3=ffffb8c466c0 items=0 ppid=2654 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:56:44.887000 audit[2697]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.887000 audit[2697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff47225f0 a2=0 a3=ffff812d76c0 items=0 ppid=2654 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:56:44.889000 audit[2699]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:44.889000 audit[2699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce22dbe0 a2=0 a3=ffff97b276c0 items=0 ppid=2654 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:56:44.891000 audit[2700]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.891000 audit[2700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda185cd0 a2=0 a3=ffff8cd136c0 items=0 ppid=2654 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:56:44.891000 audit[2701]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:44.891000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee9ae7a0 a2=0 a3=ffff899cd6c0 items=0 ppid=2654 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:56:44.984000 audit[2702]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.984000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffb1e38c0 a2=0 a3=ffffb1b046c0 items=0 ppid=2654 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:56:44.990000 audit[2704]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.990000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeb60b690 a2=0 a3=ffff9184e6c0 items=0 ppid=2654 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:56:44.994000 audit[2707]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.994000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb142a20 a2=0 a3=ffff91b356c0 items=0 ppid=2654 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:56:44.995000 audit[2708]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.995000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc02014e0 a2=0 a3=ffff80a6c6c0 items=0 ppid=2654 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:56:44.997000 audit[2710]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.997000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffffa7d090 a2=0 a3=ffff98bf66c0 items=0 ppid=2654 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:56:44.998000 audit[2711]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:44.998000 audit[2711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc02d9830 a2=0 a3=ffffa7f486c0 items=0 ppid=2654 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:44.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:56:45.001000 audit[2713]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.001000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe15ce8b0 a2=0 a3=ffffab7446c0 items=0 ppid=2654 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:56:45.004000 audit[2716]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.004000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe406a400 a2=0 a3=ffff88d656c0 items=0 ppid=2654 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:56:45.005000 audit[2717]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.005000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea3d17c0 a2=0 a3=ffffb19386c0 items=0 ppid=2654 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:56:45.008000 audit[2719]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.008000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd9b8550 a2=0 a3=ffffaf8566c0 items=0 ppid=2654 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:56:45.009000 audit[2720]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.009000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff5f52f0 a2=0 a3=ffff94ec56c0 items=0 ppid=2654 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:56:45.011000 audit[2722]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.011000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc12af180 a2=0 a3=ffff9ee726c0 items=0 ppid=2654 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:56:45.014000 audit[2725]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.014000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4c01840 a2=0 a3=ffffb94b36c0 items=0 ppid=2654 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:56:45.018000 audit[2728]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.018000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4675cf0 a2=0 a3=ffff9e5766c0 items=0 ppid=2654 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:56:45.019000 audit[2729]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.019000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb273140 a2=0 a3=ffff848776c0 items=0 ppid=2654 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:56:45.022000 audit[2731]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.022000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe82fc510 a2=0 a3=ffffbb2796c0 items=0 ppid=2654 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:56:45.025000 audit[2734]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.025000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe11c81c0 a2=0 a3=ffff9d08e6c0 items=0 ppid=2654 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:56:45.027000 audit[2735]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.027000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff19d9f30 a2=0 a3=ffffb3ca86c0 items=0 ppid=2654 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:56:45.029000 audit[2737]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:56:45.029000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc6007ad0 a2=0 a3=ffff9fb246c0 items=0 ppid=2654 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:56:45.113000 audit[2743]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:45.113000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc20a1a10 a2=0 a3=ffff970966c0 items=0 ppid=2654 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:45.144000 audit[2743]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:45.144000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc20a1a10 a2=0 a3=ffff970966c0 items=0 ppid=2654 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:45.146000 audit[2748]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.146000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff010ad00 a2=0 a3=ffff89e8d6c0 items=0 ppid=2654 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:56:45.148000 audit[2750]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.148000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd784c310 a2=0 a3=ffff941f16c0 items=0 ppid=2654 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:56:45.152000 audit[2753]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.152000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff3f5bc70 a2=0 a3=ffffbae4e6c0 items=0 ppid=2654 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:56:45.153000 audit[2754]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.153000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc44c7230 a2=0 a3=ffffb051f6c0 items=0 ppid=2654 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:56:45.157000 audit[2756]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.157000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff67cf600 a2=0 a3=ffff99e086c0 items=0 ppid=2654 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:56:45.158000 audit[2757]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.158000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdbde6a60 a2=0 a3=ffff82cb56c0 items=0 ppid=2654 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:56:45.161000 audit[2759]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.161000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd5dfc3a0 a2=0 a3=ffff855066c0 items=0 ppid=2654 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:56:45.165000 audit[2762]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.165000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffedf377f0 a2=0 a3=ffff9fb096c0 items=0 ppid=2654 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:56:45.166000 audit[2763]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.166000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbe147e0 a2=0 a3=ffff90bf86c0 items=0 ppid=2654 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:56:45.169000 audit[2765]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.169000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3829e90 a2=0 a3=ffffaf3be6c0 items=0 ppid=2654 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:56:45.170000 audit[2766]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.170000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe48b80a0 a2=0 a3=ffff9ca7c6c0 items=0 ppid=2654 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:56:45.173000 audit[2768]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.173000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8c82760 a2=0 a3=ffff8f0386c0 items=0 ppid=2654 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:56:45.176000 audit[2771]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.176000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff707d6a0 a2=0 a3=ffffaf00a6c0 items=0 ppid=2654 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:56:45.179000 audit[2774]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.179000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7a0fb20 a2=0 a3=ffffbe4bb6c0 items=0 ppid=2654 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:56:45.180000 audit[2775]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.180000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe7a1b480 a2=0 a3=ffffa6e936c0 items=0 ppid=2654 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:56:45.182000 audit[2777]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.182000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc5aee940 a2=0 a3=ffff936076c0 items=0 ppid=2654 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:56:45.185000 audit[2780]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.185000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd346e090 a2=0 a3=ffffb98856c0 items=0 ppid=2654 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:56:45.187000 audit[2781]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.187000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1f10da0 a2=0 a3=ffff909b46c0 items=0 ppid=2654 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:56:45.189000 audit[2783]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.189000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffde3f8410 a2=0 a3=ffffa70306c0 items=0 ppid=2654 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:56:45.190000 audit[2784]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.190000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc014dda0 a2=0 a3=ffff83d766c0 items=0 ppid=2654 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:56:45.192000 audit[2786]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.192000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe97c2870 a2=0 a3=ffff8b1706c0 items=0 ppid=2654 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:56:45.195000 audit[2789]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:56:45.195000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd16a7320 a2=0 a3=ffffa1bd36c0 items=0 ppid=2654 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:56:45.198000 audit[2791]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:56:45.198000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc57d79e0 a2=0 a3=ffffae3986c0 items=0 ppid=2654 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.198000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:45.198000 audit[2791]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:56:45.198000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc57d79e0 a2=0 a3=ffffae3986c0 items=0 ppid=2654 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:45.198000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:45.331366 systemd[1]: run-containerd-runc-k8s.io-b1e9f74229abe4936a2f64463bdde88a63684cf6324e0a716717848ece220903-runc.FD1Ukf.mount: Deactivated successfully. Feb 9 09:56:45.822850 kubelet[2478]: I0209 09:56:45.822817 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-tfht7" podStartSLOduration=1.8227704820000001 podCreationTimestamp="2024-02-09 09:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:45.821460273 +0000 UTC m=+16.208258649" watchObservedRunningTime="2024-02-09 09:56:45.822770482 +0000 UTC m=+16.209568858" Feb 9 09:56:46.268875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2927560093.mount: Deactivated successfully. Feb 9 09:56:46.965974 env[1354]: time="2024-02-09T09:56:46.965926344Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:46.972073 env[1354]: time="2024-02-09T09:56:46.972029687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:46.977958 env[1354]: time="2024-02-09T09:56:46.977914741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:46.981901 env[1354]: time="2024-02-09T09:56:46.981864965Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:46.982623 env[1354]: time="2024-02-09T09:56:46.982592152Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 09:56:46.985832 env[1354]: time="2024-02-09T09:56:46.985792829Z" level=info msg="CreateContainer within sandbox \"badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 09:56:47.013432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount314280224.mount: Deactivated successfully. Feb 9 09:56:47.017680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount931612700.mount: Deactivated successfully. Feb 9 09:56:47.043255 env[1354]: time="2024-02-09T09:56:47.043199895Z" level=info msg="CreateContainer within sandbox \"badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9\"" Feb 9 09:56:47.044101 env[1354]: time="2024-02-09T09:56:47.044074406Z" level=info msg="StartContainer for \"234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9\"" Feb 9 09:56:47.062461 systemd[1]: Started cri-containerd-234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9.scope. Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.076000 audit: BPF prog-id=121 op=LOAD Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2604 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:47.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343538306561353564393135373332626566373634633833643333 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2604 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:47.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343538306561353564393135373332626566373634633833643333 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit: BPF prog-id=122 op=LOAD Feb 9 09:56:47.077000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2604 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:47.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343538306561353564393135373332626566373634633833643333 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit: BPF prog-id=123 op=LOAD Feb 9 09:56:47.077000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2604 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:47.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343538306561353564393135373332626566373634633833643333 Feb 9 09:56:47.077000 audit: BPF prog-id=123 op=UNLOAD Feb 9 09:56:47.077000 audit: BPF prog-id=122 op=UNLOAD Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:47.077000 audit: BPF prog-id=124 op=LOAD Feb 9 09:56:47.077000 audit[2799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2604 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:47.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343538306561353564393135373332626566373634633833643333 Feb 9 09:56:47.105677 env[1354]: time="2024-02-09T09:56:47.105532848Z" level=info msg="StartContainer for \"234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9\" returns successfully" Feb 9 09:56:47.826583 kubelet[2478]: I0209 09:56:47.826534 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-sswx8" podStartSLOduration=1.632951754 podCreationTimestamp="2024-02-09 09:56:44 +0000 UTC" firstStartedPulling="2024-02-09 09:56:44.789948066 +0000 UTC m=+15.176746402" lastFinishedPulling="2024-02-09 09:56:46.983493305 +0000 UTC m=+17.370291681" observedRunningTime="2024-02-09 09:56:47.826347268 +0000 UTC m=+18.213145644" watchObservedRunningTime="2024-02-09 09:56:47.826497033 +0000 UTC m=+18.213295409" Feb 9 09:56:50.469221 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 9 09:56:50.469381 kernel: audit: type=1325 audit(1707472610.449:1069): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.449000 audit[2831]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.475335 kernel: audit: type=1300 audit(1707472610.449:1069): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffeb67c770 a2=0 a3=ffff802cf6c0 items=0 ppid=2654 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.449000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffeb67c770 a2=0 a3=ffff802cf6c0 items=0 ppid=2654 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.524224 kernel: audit: type=1327 audit(1707472610.449:1069): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.524367 kernel: audit: type=1325 audit(1707472610.465:1070): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.465000 audit[2831]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.465000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffeb67c770 a2=0 a3=ffff802cf6c0 items=0 ppid=2654 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.573733 kernel: audit: type=1300 audit(1707472610.465:1070): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffeb67c770 a2=0 a3=ffff802cf6c0 items=0 ppid=2654 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.590981 kernel: audit: type=1327 audit(1707472610.465:1070): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.591117 kernel: audit: type=1325 audit(1707472610.519:1071): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.519000 audit[2833]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.519000 audit[2833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdc0acb40 a2=0 a3=ffffb6a386c0 items=0 ppid=2654 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.647367 kernel: audit: type=1300 audit(1707472610.519:1071): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdc0acb40 a2=0 a3=ffffb6a386c0 items=0 ppid=2654 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.663442 kernel: audit: type=1327 audit(1707472610.519:1071): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.664345 kernel: audit: type=1325 audit(1707472610.523:1072): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.523000 audit[2833]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:50.523000 audit[2833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdc0acb40 a2=0 a3=ffffb6a386c0 items=0 ppid=2654 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:50.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:50.690181 kubelet[2478]: I0209 09:56:50.690144 2478 topology_manager.go:215] "Topology Admit Handler" podUID="5b709fd4-99ac-4f14-8871-2733de01d19f" podNamespace="calico-system" podName="calico-typha-58b4f7f9c9-vc7r9" Feb 9 09:56:50.695002 systemd[1]: Created slice kubepods-besteffort-pod5b709fd4_99ac_4f14_8871_2733de01d19f.slice. Feb 9 09:56:50.814184 kubelet[2478]: I0209 09:56:50.814153 2478 topology_manager.go:215] "Topology Admit Handler" podUID="3baee126-5d72-4833-bcf0-0540aa2932d3" podNamespace="calico-system" podName="calico-node-pmjzs" Feb 9 09:56:50.819080 systemd[1]: Created slice kubepods-besteffort-pod3baee126_5d72_4833_bcf0_0540aa2932d3.slice. Feb 9 09:56:50.870791 kubelet[2478]: I0209 09:56:50.870749 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5b709fd4-99ac-4f14-8871-2733de01d19f-tigera-ca-bundle\") pod \"calico-typha-58b4f7f9c9-vc7r9\" (UID: \"5b709fd4-99ac-4f14-8871-2733de01d19f\") " pod="calico-system/calico-typha-58b4f7f9c9-vc7r9" Feb 9 09:56:50.870791 kubelet[2478]: I0209 09:56:50.870799 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5j7ds\" (UniqueName: \"kubernetes.io/projected/5b709fd4-99ac-4f14-8871-2733de01d19f-kube-api-access-5j7ds\") pod \"calico-typha-58b4f7f9c9-vc7r9\" (UID: \"5b709fd4-99ac-4f14-8871-2733de01d19f\") " pod="calico-system/calico-typha-58b4f7f9c9-vc7r9" Feb 9 09:56:50.870983 kubelet[2478]: I0209 09:56:50.870822 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5b709fd4-99ac-4f14-8871-2733de01d19f-typha-certs\") pod \"calico-typha-58b4f7f9c9-vc7r9\" (UID: \"5b709fd4-99ac-4f14-8871-2733de01d19f\") " pod="calico-system/calico-typha-58b4f7f9c9-vc7r9" Feb 9 09:56:50.957301 kubelet[2478]: I0209 09:56:50.957259 2478 topology_manager.go:215] "Topology Admit Handler" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" podNamespace="calico-system" podName="csi-node-driver-dplm2" Feb 9 09:56:50.957564 kubelet[2478]: E0209 09:56:50.957536 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:56:50.971521 kubelet[2478]: I0209 09:56:50.971483 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3baee126-5d72-4833-bcf0-0540aa2932d3-node-certs\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971521 kubelet[2478]: I0209 09:56:50.971525 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4c306363-d8b2-4748-ba56-4ceeadd41ddf-kubelet-dir\") pod \"csi-node-driver-dplm2\" (UID: \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\") " pod="calico-system/csi-node-driver-dplm2" Feb 9 09:56:50.971704 kubelet[2478]: I0209 09:56:50.971549 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-xtables-lock\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971704 kubelet[2478]: I0209 09:56:50.971569 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-lib-modules\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971704 kubelet[2478]: I0209 09:56:50.971587 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kq698\" (UniqueName: \"kubernetes.io/projected/3baee126-5d72-4833-bcf0-0540aa2932d3-kube-api-access-kq698\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971704 kubelet[2478]: I0209 09:56:50.971605 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4c306363-d8b2-4748-ba56-4ceeadd41ddf-varrun\") pod \"csi-node-driver-dplm2\" (UID: \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\") " pod="calico-system/csi-node-driver-dplm2" Feb 9 09:56:50.971704 kubelet[2478]: I0209 09:56:50.971641 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-cni-log-dir\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971832 kubelet[2478]: I0209 09:56:50.971663 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-var-run-calico\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971832 kubelet[2478]: I0209 09:56:50.971683 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-var-lib-calico\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971832 kubelet[2478]: I0209 09:56:50.971701 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-cni-net-dir\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971832 kubelet[2478]: I0209 09:56:50.971721 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-flexvol-driver-host\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971832 kubelet[2478]: I0209 09:56:50.971743 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-cni-bin-dir\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971953 kubelet[2478]: I0209 09:56:50.971763 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4c306363-d8b2-4748-ba56-4ceeadd41ddf-socket-dir\") pod \"csi-node-driver-dplm2\" (UID: \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\") " pod="calico-system/csi-node-driver-dplm2" Feb 9 09:56:50.971953 kubelet[2478]: I0209 09:56:50.971805 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5lh57\" (UniqueName: \"kubernetes.io/projected/4c306363-d8b2-4748-ba56-4ceeadd41ddf-kube-api-access-5lh57\") pod \"csi-node-driver-dplm2\" (UID: \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\") " pod="calico-system/csi-node-driver-dplm2" Feb 9 09:56:50.971953 kubelet[2478]: I0209 09:56:50.971844 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3baee126-5d72-4833-bcf0-0540aa2932d3-policysync\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971953 kubelet[2478]: I0209 09:56:50.971863 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3baee126-5d72-4833-bcf0-0540aa2932d3-tigera-ca-bundle\") pod \"calico-node-pmjzs\" (UID: \"3baee126-5d72-4833-bcf0-0540aa2932d3\") " pod="calico-system/calico-node-pmjzs" Feb 9 09:56:50.971953 kubelet[2478]: I0209 09:56:50.971881 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4c306363-d8b2-4748-ba56-4ceeadd41ddf-registration-dir\") pod \"csi-node-driver-dplm2\" (UID: \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\") " pod="calico-system/csi-node-driver-dplm2" Feb 9 09:56:51.090796 kubelet[2478]: E0209 09:56:51.090138 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:51.090796 kubelet[2478]: W0209 09:56:51.090162 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:51.090796 kubelet[2478]: E0209 09:56:51.090190 2478 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:51.090796 kubelet[2478]: E0209 09:56:51.090426 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:51.090796 kubelet[2478]: W0209 09:56:51.090436 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:51.090796 kubelet[2478]: E0209 09:56:51.090453 2478 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:51.108477 kubelet[2478]: E0209 09:56:51.108379 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:51.108477 kubelet[2478]: W0209 09:56:51.108406 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:51.108477 kubelet[2478]: E0209 09:56:51.108430 2478 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:51.109689 kubelet[2478]: E0209 09:56:51.109672 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:56:51.109809 kubelet[2478]: W0209 09:56:51.109795 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:56:51.109877 kubelet[2478]: E0209 09:56:51.109867 2478 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:56:51.124058 env[1354]: time="2024-02-09T09:56:51.123682242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pmjzs,Uid:3baee126-5d72-4833-bcf0-0540aa2932d3,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:51.164157 env[1354]: time="2024-02-09T09:56:51.164087756Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:51.164157 env[1354]: time="2024-02-09T09:56:51.164126797Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:51.164371 env[1354]: time="2024-02-09T09:56:51.164137038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:51.164371 env[1354]: time="2024-02-09T09:56:51.164247841Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0 pid=2849 runtime=io.containerd.runc.v2 Feb 9 09:56:51.177698 systemd[1]: Started cri-containerd-5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0.scope. Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.197000 audit: BPF prog-id=125 op=LOAD Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2849 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376235303664383338646533636266613232383466316335663338 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2849 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376235303664383338646533636266613232383466316335663338 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit: BPF prog-id=126 op=LOAD Feb 9 09:56:51.198000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2849 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376235303664383338646533636266613232383466316335663338 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit: BPF prog-id=127 op=LOAD Feb 9 09:56:51.198000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2849 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376235303664383338646533636266613232383466316335663338 Feb 9 09:56:51.198000 audit: BPF prog-id=127 op=UNLOAD Feb 9 09:56:51.198000 audit: BPF prog-id=126 op=UNLOAD Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.198000 audit: BPF prog-id=128 op=LOAD Feb 9 09:56:51.198000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2849 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566376235303664383338646533636266613232383466316335663338 Feb 9 09:56:51.212179 env[1354]: time="2024-02-09T09:56:51.212139646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pmjzs,Uid:3baee126-5d72-4833-bcf0-0540aa2932d3,Namespace:calico-system,Attempt:0,} returns sandbox id \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\"" Feb 9 09:56:51.214004 env[1354]: time="2024-02-09T09:56:51.213976627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:56:51.300227 env[1354]: time="2024-02-09T09:56:51.300186875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58b4f7f9c9-vc7r9,Uid:5b709fd4-99ac-4f14-8871-2733de01d19f,Namespace:calico-system,Attempt:0,}" Feb 9 09:56:51.337737 env[1354]: time="2024-02-09T09:56:51.337660971Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:56:51.337737 env[1354]: time="2024-02-09T09:56:51.337731853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:56:51.337908 env[1354]: time="2024-02-09T09:56:51.337757774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:56:51.337941 env[1354]: time="2024-02-09T09:56:51.337894858Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4bb43b13743c216eb5514b6faf0af50bf4c548915ab8c5a6f81dc20619db90c4 pid=2893 runtime=io.containerd.runc.v2 Feb 9 09:56:51.350772 systemd[1]: Started cri-containerd-4bb43b13743c216eb5514b6faf0af50bf4c548915ab8c5a6f81dc20619db90c4.scope. Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.368000 audit: BPF prog-id=129 op=LOAD Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623433623133373433633231366562353531346236666166306166 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623433623133373433633231366562353531346236666166306166 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit: BPF prog-id=130 op=LOAD Feb 9 09:56:51.369000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623433623133373433633231366562353531346236666166306166 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit: BPF prog-id=131 op=LOAD Feb 9 09:56:51.369000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623433623133373433633231366562353531346236666166306166 Feb 9 09:56:51.369000 audit: BPF prog-id=131 op=UNLOAD Feb 9 09:56:51.369000 audit: BPF prog-id=130 op=UNLOAD Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:51.369000 audit: BPF prog-id=132 op=LOAD Feb 9 09:56:51.369000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623433623133373433633231366562353531346236666166306166 Feb 9 09:56:51.391935 env[1354]: time="2024-02-09T09:56:51.391882747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58b4f7f9c9-vc7r9,Uid:5b709fd4-99ac-4f14-8871-2733de01d19f,Namespace:calico-system,Attempt:0,} returns sandbox id \"4bb43b13743c216eb5514b6faf0af50bf4c548915ab8c5a6f81dc20619db90c4\"" Feb 9 09:56:51.613000 audit[2926]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:51.613000 audit[2926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe3c213a0 a2=0 a3=ffffb039e6c0 items=0 ppid=2654 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:51.616000 audit[2926]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:56:51.616000 audit[2926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe3c213a0 a2=0 a3=ffffb039e6c0 items=0 ppid=2654 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:56:52.751068 kubelet[2478]: E0209 09:56:52.751029 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:56:52.873797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1169027806.mount: Deactivated successfully. Feb 9 09:56:53.033394 env[1354]: time="2024-02-09T09:56:53.033129277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:53.040038 env[1354]: time="2024-02-09T09:56:53.039992819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:53.048028 env[1354]: time="2024-02-09T09:56:53.047991359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:53.054287 env[1354]: time="2024-02-09T09:56:53.054243762Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:53.055054 env[1354]: time="2024-02-09T09:56:53.055027267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 09:56:53.059679 env[1354]: time="2024-02-09T09:56:53.059645417Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:56:53.060086 env[1354]: time="2024-02-09T09:56:53.059856464Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 09:56:53.089730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1003578821.mount: Deactivated successfully. Feb 9 09:56:53.103423 env[1354]: time="2024-02-09T09:56:53.103369756Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8\"" Feb 9 09:56:53.104959 env[1354]: time="2024-02-09T09:56:53.104500072Z" level=info msg="StartContainer for \"b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8\"" Feb 9 09:56:53.135515 systemd[1]: Started cri-containerd-b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8.scope. Feb 9 09:56:53.155000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.155000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2849 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:53.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230363531653730303863613266643664643638653739343561653639 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit: BPF prog-id=133 op=LOAD Feb 9 09:56:53.156000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2849 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:53.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230363531653730303863613266643664643638653739343561653639 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.156000 audit: BPF prog-id=134 op=LOAD Feb 9 09:56:53.156000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2849 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:53.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230363531653730303863613266643664643638653739343561653639 Feb 9 09:56:53.157000 audit: BPF prog-id=134 op=UNLOAD Feb 9 09:56:53.157000 audit: BPF prog-id=133 op=UNLOAD Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:53.157000 audit: BPF prog-id=135 op=LOAD Feb 9 09:56:53.157000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2849 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:53.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230363531653730303863613266643664643638653739343561653639 Feb 9 09:56:53.180097 env[1354]: time="2024-02-09T09:56:53.180050483Z" level=info msg="StartContainer for \"b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8\" returns successfully" Feb 9 09:56:53.184703 systemd[1]: cri-containerd-b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8.scope: Deactivated successfully. Feb 9 09:56:53.187000 audit: BPF prog-id=135 op=UNLOAD Feb 9 09:56:53.213839 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8-rootfs.mount: Deactivated successfully. Feb 9 09:56:53.733569 env[1354]: time="2024-02-09T09:56:53.733524880Z" level=info msg="shim disconnected" id=b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8 Feb 9 09:56:53.733860 env[1354]: time="2024-02-09T09:56:53.733841091Z" level=warning msg="cleaning up after shim disconnected" id=b0651e7008ca2fd6dd68e7945ae696ff231551c8b1e265be473323f785756fe8 namespace=k8s.io Feb 9 09:56:53.733952 env[1354]: time="2024-02-09T09:56:53.733937694Z" level=info msg="cleaning up dead shim" Feb 9 09:56:53.741960 env[1354]: time="2024-02-09T09:56:53.741917633Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:56:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2972 runtime=io.containerd.runc.v2\n" Feb 9 09:56:54.751513 kubelet[2478]: E0209 09:56:54.751472 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:56:54.872679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2023048191.mount: Deactivated successfully. Feb 9 09:56:55.924580 env[1354]: time="2024-02-09T09:56:55.924540349Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:55.931933 env[1354]: time="2024-02-09T09:56:55.931894340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:55.937053 env[1354]: time="2024-02-09T09:56:55.937018621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:55.941688 env[1354]: time="2024-02-09T09:56:55.941655887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:56:55.942432 env[1354]: time="2024-02-09T09:56:55.942404391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 09:56:55.949371 env[1354]: time="2024-02-09T09:56:55.949340009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:56:55.956338 env[1354]: time="2024-02-09T09:56:55.956277187Z" level=info msg="CreateContainer within sandbox \"4bb43b13743c216eb5514b6faf0af50bf4c548915ab8c5a6f81dc20619db90c4\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 09:56:55.989118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2395230859.mount: Deactivated successfully. Feb 9 09:56:56.002697 env[1354]: time="2024-02-09T09:56:56.002646044Z" level=info msg="CreateContainer within sandbox \"4bb43b13743c216eb5514b6faf0af50bf4c548915ab8c5a6f81dc20619db90c4\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d0ca00c5f10b96f93ce8b3f733053cbb0542d1c97d3c0cbe9c1c5450c33b913f\"" Feb 9 09:56:56.003350 env[1354]: time="2024-02-09T09:56:56.003301145Z" level=info msg="StartContainer for \"d0ca00c5f10b96f93ce8b3f733053cbb0542d1c97d3c0cbe9c1c5450c33b913f\"" Feb 9 09:56:56.021807 systemd[1]: Started cri-containerd-d0ca00c5f10b96f93ce8b3f733053cbb0542d1c97d3c0cbe9c1c5450c33b913f.scope. Feb 9 09:56:56.043971 kernel: kauditd_printk_skb: 166 callbacks suppressed Feb 9 09:56:56.044098 kernel: audit: type=1400 audit(1707472616.037:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.087865 kernel: audit: type=1400 audit(1707472616.037:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.109265 kernel: audit: type=1400 audit(1707472616.037:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.131554 kernel: audit: type=1400 audit(1707472616.037:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.154934 kernel: audit: type=1400 audit(1707472616.037:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.177407 kernel: audit: type=1400 audit(1707472616.037:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.199418 kernel: audit: type=1400 audit(1707472616.037:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.223629 kernel: audit: type=1400 audit(1707472616.037:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.245104 kernel: audit: type=1400 audit(1707472616.037:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.267448 kernel: audit: type=1400 audit(1707472616.043:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.043000 audit: BPF prog-id=136 op=LOAD Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2893 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:56.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636130306335663130623936663933636538623366373333303533 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2893 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:56.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636130306335663130623936663933636538623366373333303533 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit: BPF prog-id=137 op=LOAD Feb 9 09:56:56.065000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2893 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:56.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636130306335663130623936663933636538623366373333303533 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.065000 audit: BPF prog-id=138 op=LOAD Feb 9 09:56:56.065000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2893 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:56.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636130306335663130623936663933636538623366373333303533 Feb 9 09:56:56.066000 audit: BPF prog-id=138 op=UNLOAD Feb 9 09:56:56.066000 audit: BPF prog-id=137 op=UNLOAD Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:56.066000 audit: BPF prog-id=139 op=LOAD Feb 9 09:56:56.066000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2893 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:56.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636130306335663130623936663933636538623366373333303533 Feb 9 09:56:56.277271 env[1354]: time="2024-02-09T09:56:56.277213871Z" level=info msg="StartContainer for \"d0ca00c5f10b96f93ce8b3f733053cbb0542d1c97d3c0cbe9c1c5450c33b913f\" returns successfully" Feb 9 09:56:56.751656 kubelet[2478]: E0209 09:56:56.751358 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:56:56.846754 kubelet[2478]: I0209 09:56:56.846703 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-58b4f7f9c9-vc7r9" podStartSLOduration=2.296558686 podCreationTimestamp="2024-02-09 09:56:50 +0000 UTC" firstStartedPulling="2024-02-09 09:56:51.393141269 +0000 UTC m=+21.779939645" lastFinishedPulling="2024-02-09 09:56:55.943250457 +0000 UTC m=+26.330048833" observedRunningTime="2024-02-09 09:56:56.84655235 +0000 UTC m=+27.233350726" watchObservedRunningTime="2024-02-09 09:56:56.846667874 +0000 UTC m=+27.233466250" Feb 9 09:56:57.473720 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4128981021.mount: Deactivated successfully. Feb 9 09:56:57.837000 kubelet[2478]: I0209 09:56:57.836968 2478 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:56:58.751406 kubelet[2478]: E0209 09:56:58.751374 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:56:59.949113 kubelet[2478]: I0209 09:56:59.949053 2478 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:57:00.000000 audit[3030]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:00.000000 audit[3030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc5aafa40 a2=0 a3=ffff82e3d6c0 items=0 ppid=2654 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:00.001000 audit[3030]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:00.001000 audit[3030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffc5aafa40 a2=0 a3=ffff82e3d6c0 items=0 ppid=2654 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:00.543497 env[1354]: time="2024-02-09T09:57:00.543457575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:00.549165 env[1354]: time="2024-02-09T09:57:00.549134621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:00.556333 env[1354]: time="2024-02-09T09:57:00.556281150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:00.560481 env[1354]: time="2024-02-09T09:57:00.560453672Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:00.561177 env[1354]: time="2024-02-09T09:57:00.561151413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 09:57:00.564350 env[1354]: time="2024-02-09T09:57:00.563431959Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:57:00.591196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3385300210.mount: Deactivated successfully. Feb 9 09:57:00.605433 env[1354]: time="2024-02-09T09:57:00.605386146Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c\"" Feb 9 09:57:00.606065 env[1354]: time="2024-02-09T09:57:00.606039565Z" level=info msg="StartContainer for \"5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c\"" Feb 9 09:57:00.628581 systemd[1]: Started cri-containerd-5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c.scope. Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2849 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626361626333653337333366363362663231383632613932616462 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit: BPF prog-id=140 op=LOAD Feb 9 09:57:00.643000 audit[3039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2849 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626361626333653337333366363362663231383632613932616462 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit: BPF prog-id=141 op=LOAD Feb 9 09:57:00.643000 audit[3039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2849 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626361626333653337333366363362663231383632613932616462 Feb 9 09:57:00.643000 audit: BPF prog-id=141 op=UNLOAD Feb 9 09:57:00.643000 audit: BPF prog-id=140 op=UNLOAD Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { perfmon } for pid=3039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit[3039]: AVC avc: denied { bpf } for pid=3039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:00.643000 audit: BPF prog-id=142 op=LOAD Feb 9 09:57:00.643000 audit[3039]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2849 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:00.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626361626333653337333366363362663231383632613932616462 Feb 9 09:57:00.665479 env[1354]: time="2024-02-09T09:57:00.665436342Z" level=info msg="StartContainer for \"5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c\" returns successfully" Feb 9 09:57:00.751461 kubelet[2478]: E0209 09:57:00.751061 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:57:01.588569 systemd[1]: run-containerd-runc-k8s.io-5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c-runc.oz3CZo.mount: Deactivated successfully. Feb 9 09:57:01.863104 env[1354]: time="2024-02-09T09:57:01.862989608Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:57:01.866421 systemd[1]: cri-containerd-5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c.scope: Deactivated successfully. Feb 9 09:57:01.868000 audit: BPF prog-id=142 op=UNLOAD Feb 9 09:57:01.875087 kernel: kauditd_printk_skb: 96 callbacks suppressed Feb 9 09:57:01.875182 kernel: audit: type=1334 audit(1707472621.868:1144): prog-id=142 op=UNLOAD Feb 9 09:57:01.894298 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c-rootfs.mount: Deactivated successfully. Feb 9 09:57:01.967168 kubelet[2478]: I0209 09:57:01.966588 2478 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:57:01.994037 kubelet[2478]: I0209 09:57:01.994005 2478 topology_manager.go:215] "Topology Admit Handler" podUID="b7875f62-26d8-4cbc-b848-01725b8d995a" podNamespace="kube-system" podName="coredns-5dd5756b68-rs9xj" Feb 9 09:57:01.997071 kubelet[2478]: I0209 09:57:01.997012 2478 topology_manager.go:215] "Topology Admit Handler" podUID="63e62d1c-7013-46ac-8386-69127cbc8a8b" podNamespace="calico-system" podName="calico-kube-controllers-b46bf9566-x7cs5" Feb 9 09:57:02.000229 systemd[1]: Created slice kubepods-burstable-podb7875f62_26d8_4cbc_b848_01725b8d995a.slice. Feb 9 09:57:02.001232 kubelet[2478]: W0209 09:57:02.001201 2478 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-08b227d6a8" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-08b227d6a8' and this object Feb 9 09:57:02.001333 kubelet[2478]: E0209 09:57:02.001241 2478 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-08b227d6a8" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-08b227d6a8' and this object Feb 9 09:57:02.012840 kubelet[2478]: I0209 09:57:02.012800 2478 topology_manager.go:215] "Topology Admit Handler" podUID="ad2fe95e-e733-40d2-9159-940d3d488021" podNamespace="kube-system" podName="coredns-5dd5756b68-z6xr8" Feb 9 09:57:02.015371 systemd[1]: Created slice kubepods-besteffort-pod63e62d1c_7013_46ac_8386_69127cbc8a8b.slice. Feb 9 09:57:02.021556 systemd[1]: Created slice kubepods-burstable-podad2fe95e_e733_40d2_9159_940d3d488021.slice. Feb 9 09:57:02.060695 kubelet[2478]: I0209 09:57:02.058387 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvst9\" (UniqueName: \"kubernetes.io/projected/ad2fe95e-e733-40d2-9159-940d3d488021-kube-api-access-tvst9\") pod \"coredns-5dd5756b68-z6xr8\" (UID: \"ad2fe95e-e733-40d2-9159-940d3d488021\") " pod="kube-system/coredns-5dd5756b68-z6xr8" Feb 9 09:57:02.060695 kubelet[2478]: I0209 09:57:02.058433 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-728ft\" (UniqueName: \"kubernetes.io/projected/b7875f62-26d8-4cbc-b848-01725b8d995a-kube-api-access-728ft\") pod \"coredns-5dd5756b68-rs9xj\" (UID: \"b7875f62-26d8-4cbc-b848-01725b8d995a\") " pod="kube-system/coredns-5dd5756b68-rs9xj" Feb 9 09:57:02.060695 kubelet[2478]: I0209 09:57:02.058471 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbcv4\" (UniqueName: \"kubernetes.io/projected/63e62d1c-7013-46ac-8386-69127cbc8a8b-kube-api-access-fbcv4\") pod \"calico-kube-controllers-b46bf9566-x7cs5\" (UID: \"63e62d1c-7013-46ac-8386-69127cbc8a8b\") " pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" Feb 9 09:57:02.060695 kubelet[2478]: I0209 09:57:02.058496 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ad2fe95e-e733-40d2-9159-940d3d488021-config-volume\") pod \"coredns-5dd5756b68-z6xr8\" (UID: \"ad2fe95e-e733-40d2-9159-940d3d488021\") " pod="kube-system/coredns-5dd5756b68-z6xr8" Feb 9 09:57:02.060695 kubelet[2478]: I0209 09:57:02.058515 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b7875f62-26d8-4cbc-b848-01725b8d995a-config-volume\") pod \"coredns-5dd5756b68-rs9xj\" (UID: \"b7875f62-26d8-4cbc-b848-01725b8d995a\") " pod="kube-system/coredns-5dd5756b68-rs9xj" Feb 9 09:57:02.060993 kubelet[2478]: I0209 09:57:02.058547 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/63e62d1c-7013-46ac-8386-69127cbc8a8b-tigera-ca-bundle\") pod \"calico-kube-controllers-b46bf9566-x7cs5\" (UID: \"63e62d1c-7013-46ac-8386-69127cbc8a8b\") " pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" Feb 9 09:57:02.620196 env[1354]: time="2024-02-09T09:57:02.619847030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b46bf9566-x7cs5,Uid:63e62d1c-7013-46ac-8386-69127cbc8a8b,Namespace:calico-system,Attempt:0,}" Feb 9 09:57:02.755706 systemd[1]: Created slice kubepods-besteffort-pod4c306363_d8b2_4748_ba56_4ceeadd41ddf.slice. Feb 9 09:57:02.758299 env[1354]: time="2024-02-09T09:57:02.758259007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dplm2,Uid:4c306363-d8b2-4748-ba56-4ceeadd41ddf,Namespace:calico-system,Attempt:0,}" Feb 9 09:57:03.159674 kubelet[2478]: E0209 09:57:03.159638 2478 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:57:03.160084 kubelet[2478]: E0209 09:57:03.159637 2478 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:57:03.160084 kubelet[2478]: E0209 09:57:03.159769 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/b7875f62-26d8-4cbc-b848-01725b8d995a-config-volume podName:b7875f62-26d8-4cbc-b848-01725b8d995a nodeName:}" failed. No retries permitted until 2024-02-09 09:57:03.659715247 +0000 UTC m=+34.046513623 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/b7875f62-26d8-4cbc-b848-01725b8d995a-config-volume") pod "coredns-5dd5756b68-rs9xj" (UID: "b7875f62-26d8-4cbc-b848-01725b8d995a") : failed to sync configmap cache: timed out waiting for the condition Feb 9 09:57:03.160084 kubelet[2478]: E0209 09:57:03.159784 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/ad2fe95e-e733-40d2-9159-940d3d488021-config-volume podName:ad2fe95e-e733-40d2-9159-940d3d488021 nodeName:}" failed. No retries permitted until 2024-02-09 09:57:03.659777048 +0000 UTC m=+34.046575424 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/ad2fe95e-e733-40d2-9159-940d3d488021-config-volume") pod "coredns-5dd5756b68-z6xr8" (UID: "ad2fe95e-e733-40d2-9159-940d3d488021") : failed to sync configmap cache: timed out waiting for the condition Feb 9 09:57:03.454634 env[1354]: time="2024-02-09T09:57:03.454525241Z" level=info msg="shim disconnected" id=5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c Feb 9 09:57:03.454634 env[1354]: time="2024-02-09T09:57:03.454568362Z" level=warning msg="cleaning up after shim disconnected" id=5fbcabc3e3733f63bf21862a92adbda5578e6320748b9d4c1c8255824e07a33c namespace=k8s.io Feb 9 09:57:03.454634 env[1354]: time="2024-02-09T09:57:03.454577682Z" level=info msg="cleaning up dead shim" Feb 9 09:57:03.462184 env[1354]: time="2024-02-09T09:57:03.462138455Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:57:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3089 runtime=io.containerd.runc.v2\n" Feb 9 09:57:03.582477 env[1354]: time="2024-02-09T09:57:03.582408230Z" level=error msg="Failed to destroy network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.584811 env[1354]: time="2024-02-09T09:57:03.584765216Z" level=error msg="encountered an error cleaning up failed sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.584968 env[1354]: time="2024-02-09T09:57:03.584941581Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dplm2,Uid:4c306363-d8b2-4748-ba56-4ceeadd41ddf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.586747 kubelet[2478]: E0209 09:57:03.585505 2478 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.586747 kubelet[2478]: E0209 09:57:03.585560 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dplm2" Feb 9 09:57:03.586747 kubelet[2478]: E0209 09:57:03.585579 2478 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dplm2" Feb 9 09:57:03.586019 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e-shm.mount: Deactivated successfully. Feb 9 09:57:03.587103 kubelet[2478]: E0209 09:57:03.585625 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dplm2_calico-system(4c306363-d8b2-4748-ba56-4ceeadd41ddf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dplm2_calico-system(4c306363-d8b2-4748-ba56-4ceeadd41ddf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:57:03.599725 env[1354]: time="2024-02-09T09:57:03.599665515Z" level=error msg="Failed to destroy network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.600133 env[1354]: time="2024-02-09T09:57:03.600096007Z" level=error msg="encountered an error cleaning up failed sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.600191 env[1354]: time="2024-02-09T09:57:03.600160928Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b46bf9566-x7cs5,Uid:63e62d1c-7013-46ac-8386-69127cbc8a8b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.600795 kubelet[2478]: E0209 09:57:03.600430 2478 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.600795 kubelet[2478]: E0209 09:57:03.600485 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" Feb 9 09:57:03.600795 kubelet[2478]: E0209 09:57:03.600505 2478 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" Feb 9 09:57:03.602582 kubelet[2478]: E0209 09:57:03.600564 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-b46bf9566-x7cs5_calico-system(63e62d1c-7013-46ac-8386-69127cbc8a8b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-b46bf9566-x7cs5_calico-system(63e62d1c-7013-46ac-8386-69127cbc8a8b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" podUID="63e62d1c-7013-46ac-8386-69127cbc8a8b" Feb 9 09:57:03.814420 env[1354]: time="2024-02-09T09:57:03.814380061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rs9xj,Uid:b7875f62-26d8-4cbc-b848-01725b8d995a,Namespace:kube-system,Attempt:0,}" Feb 9 09:57:03.827693 env[1354]: time="2024-02-09T09:57:03.827640353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z6xr8,Uid:ad2fe95e-e733-40d2-9159-940d3d488021,Namespace:kube-system,Attempt:0,}" Feb 9 09:57:03.848953 kubelet[2478]: I0209 09:57:03.848465 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:03.850680 env[1354]: time="2024-02-09T09:57:03.849549568Z" level=info msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" Feb 9 09:57:03.854131 env[1354]: time="2024-02-09T09:57:03.853724285Z" level=info msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" Feb 9 09:57:03.854263 kubelet[2478]: I0209 09:57:03.852174 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:03.859618 env[1354]: time="2024-02-09T09:57:03.859575809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:57:03.916656 env[1354]: time="2024-02-09T09:57:03.916595850Z" level=error msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" failed" error="failed to destroy network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.917094 kubelet[2478]: E0209 09:57:03.917062 2478 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:03.917183 kubelet[2478]: E0209 09:57:03.917137 2478 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97"} Feb 9 09:57:03.917183 kubelet[2478]: E0209 09:57:03.917175 2478 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63e62d1c-7013-46ac-8386-69127cbc8a8b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:57:03.917284 kubelet[2478]: E0209 09:57:03.917202 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63e62d1c-7013-46ac-8386-69127cbc8a8b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" podUID="63e62d1c-7013-46ac-8386-69127cbc8a8b" Feb 9 09:57:03.933070 env[1354]: time="2024-02-09T09:57:03.933018271Z" level=error msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" failed" error="failed to destroy network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.933747 kubelet[2478]: E0209 09:57:03.933713 2478 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:03.933839 kubelet[2478]: E0209 09:57:03.933765 2478 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e"} Feb 9 09:57:03.933839 kubelet[2478]: E0209 09:57:03.933800 2478 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:57:03.933839 kubelet[2478]: E0209 09:57:03.933827 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c306363-d8b2-4748-ba56-4ceeadd41ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dplm2" podUID="4c306363-d8b2-4748-ba56-4ceeadd41ddf" Feb 9 09:57:03.939440 env[1354]: time="2024-02-09T09:57:03.939395650Z" level=error msg="Failed to destroy network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.939885 env[1354]: time="2024-02-09T09:57:03.939853423Z" level=error msg="encountered an error cleaning up failed sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.940007 env[1354]: time="2024-02-09T09:57:03.939980666Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rs9xj,Uid:b7875f62-26d8-4cbc-b848-01725b8d995a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.940359 kubelet[2478]: E0209 09:57:03.940331 2478 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.940452 kubelet[2478]: E0209 09:57:03.940384 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-rs9xj" Feb 9 09:57:03.940452 kubelet[2478]: E0209 09:57:03.940411 2478 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-rs9xj" Feb 9 09:57:03.940510 kubelet[2478]: E0209 09:57:03.940473 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-rs9xj_kube-system(b7875f62-26d8-4cbc-b848-01725b8d995a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-rs9xj_kube-system(b7875f62-26d8-4cbc-b848-01725b8d995a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-rs9xj" podUID="b7875f62-26d8-4cbc-b848-01725b8d995a" Feb 9 09:57:03.958547 env[1354]: time="2024-02-09T09:57:03.958486786Z" level=error msg="Failed to destroy network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.959007 env[1354]: time="2024-02-09T09:57:03.958975999Z" level=error msg="encountered an error cleaning up failed sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.959135 env[1354]: time="2024-02-09T09:57:03.959110203Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z6xr8,Uid:ad2fe95e-e733-40d2-9159-940d3d488021,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.961458 kubelet[2478]: E0209 09:57:03.959441 2478 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:03.961458 kubelet[2478]: E0209 09:57:03.959527 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-z6xr8" Feb 9 09:57:03.961458 kubelet[2478]: E0209 09:57:03.959548 2478 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-z6xr8" Feb 9 09:57:03.961643 kubelet[2478]: E0209 09:57:03.959614 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-z6xr8_kube-system(ad2fe95e-e733-40d2-9159-940d3d488021)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-z6xr8_kube-system(ad2fe95e-e733-40d2-9159-940d3d488021)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-z6xr8" podUID="ad2fe95e-e733-40d2-9159-940d3d488021" Feb 9 09:57:04.493534 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97-shm.mount: Deactivated successfully. Feb 9 09:57:04.862135 kubelet[2478]: I0209 09:57:04.860387 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:04.862699 env[1354]: time="2024-02-09T09:57:04.862661728Z" level=info msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" Feb 9 09:57:04.864820 kubelet[2478]: I0209 09:57:04.864680 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:04.865774 env[1354]: time="2024-02-09T09:57:04.865716812Z" level=info msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" Feb 9 09:57:04.893818 env[1354]: time="2024-02-09T09:57:04.893753509Z" level=error msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" failed" error="failed to destroy network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:04.894264 kubelet[2478]: E0209 09:57:04.894110 2478 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:04.894264 kubelet[2478]: E0209 09:57:04.894152 2478 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7"} Feb 9 09:57:04.894264 kubelet[2478]: E0209 09:57:04.894197 2478 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7875f62-26d8-4cbc-b848-01725b8d995a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:57:04.894264 kubelet[2478]: E0209 09:57:04.894228 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7875f62-26d8-4cbc-b848-01725b8d995a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-rs9xj" podUID="b7875f62-26d8-4cbc-b848-01725b8d995a" Feb 9 09:57:04.902227 env[1354]: time="2024-02-09T09:57:04.902168622Z" level=error msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" failed" error="failed to destroy network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:57:04.902737 kubelet[2478]: E0209 09:57:04.902595 2478 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:04.902737 kubelet[2478]: E0209 09:57:04.902643 2478 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab"} Feb 9 09:57:04.902737 kubelet[2478]: E0209 09:57:04.902677 2478 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad2fe95e-e733-40d2-9159-940d3d488021\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:57:04.902737 kubelet[2478]: E0209 09:57:04.902705 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad2fe95e-e733-40d2-9159-940d3d488021\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-z6xr8" podUID="ad2fe95e-e733-40d2-9159-940d3d488021" Feb 9 09:57:10.680301 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3522797831.mount: Deactivated successfully. Feb 9 09:57:11.214155 env[1354]: time="2024-02-09T09:57:11.214100674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:11.220202 env[1354]: time="2024-02-09T09:57:11.220157188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:11.223386 env[1354]: time="2024-02-09T09:57:11.223345109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:11.226446 env[1354]: time="2024-02-09T09:57:11.226413187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:11.226998 env[1354]: time="2024-02-09T09:57:11.226969601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 09:57:11.242934 env[1354]: time="2024-02-09T09:57:11.242888686Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:57:11.267559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2097706116.mount: Deactivated successfully. Feb 9 09:57:11.279783 env[1354]: time="2024-02-09T09:57:11.279727663Z" level=info msg="CreateContainer within sandbox \"5f7b506d838de3cbfa2284f1c5f38b27fe7a47e73a4d0e73fccb038024abdab0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf\"" Feb 9 09:57:11.280569 env[1354]: time="2024-02-09T09:57:11.280540884Z" level=info msg="StartContainer for \"4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf\"" Feb 9 09:57:11.296083 systemd[1]: Started cri-containerd-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf.scope. Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2849 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.365819 kernel: audit: type=1400 audit(1707472631.313:1145): avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.365970 kernel: audit: type=1300 audit(1707472631.313:1145): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2849 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343437633532323333383330316563383236373865343965393438 Feb 9 09:57:11.394032 kernel: audit: type=1327 audit(1707472631.313:1145): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343437633532323333383330316563383236373865343965393438 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.414444 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.435293 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.438023 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.475601 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.475711 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.495612 env[1354]: time="2024-02-09T09:57:11.495572874Z" level=info msg="StartContainer for \"4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf\" returns successfully" Feb 9 09:57:11.515061 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.535454 kernel: audit: type=1400 audit(1707472631.313:1146): avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.313000 audit: BPF prog-id=143 op=LOAD Feb 9 09:57:11.313000 audit[3319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2849 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343437633532323333383330316563383236373865343965393438 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit: BPF prog-id=144 op=LOAD Feb 9 09:57:11.314000 audit[3319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2849 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343437633532323333383330316563383236373865343965393438 Feb 9 09:57:11.314000 audit: BPF prog-id=144 op=UNLOAD Feb 9 09:57:11.314000 audit: BPF prog-id=143 op=UNLOAD Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { perfmon } for pid=3319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit[3319]: AVC avc: denied { bpf } for pid=3319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:11.314000 audit: BPF prog-id=145 op=LOAD Feb 9 09:57:11.314000 audit[3319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2849 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:11.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343437633532323333383330316563383236373865343965393438 Feb 9 09:57:11.848406 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:57:11.848558 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:57:11.901302 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.G5XeN0.mount: Deactivated successfully. Feb 9 09:57:11.907097 kubelet[2478]: I0209 09:57:11.906786 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pmjzs" podStartSLOduration=1.892969696 podCreationTimestamp="2024-02-09 09:56:50 +0000 UTC" firstStartedPulling="2024-02-09 09:56:51.21345905 +0000 UTC m=+21.600257426" lastFinishedPulling="2024-02-09 09:57:11.227239208 +0000 UTC m=+41.614037584" observedRunningTime="2024-02-09 09:57:11.906379965 +0000 UTC m=+42.293178341" watchObservedRunningTime="2024-02-09 09:57:11.906749854 +0000 UTC m=+42.293548230" Feb 9 09:57:12.902505 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.ZP6BnX.mount: Deactivated successfully. Feb 9 09:57:13.267000 audit[3450]: AVC avc: denied { write } for pid=3450 comm="tee" name="fd" dev="proc" ino=23883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.267000 audit[3450]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd215e96f a2=241 a3=1b6 items=1 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.267000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:57:13.267000 audit: PATH item=0 name="/dev/fd/63" inode=23867 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.267000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.276000 audit[3472]: AVC avc: denied { write } for pid=3472 comm="tee" name="fd" dev="proc" ino=24918 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.276000 audit[3472]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdeb6596e a2=241 a3=1b6 items=1 ppid=3430 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.276000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:57:13.276000 audit: PATH item=0 name="/dev/fd/63" inode=24904 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.276000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.294000 audit[3483]: AVC avc: denied { write } for pid=3483 comm="tee" name="fd" dev="proc" ino=24928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.294000 audit[3483]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffadc296d a2=241 a3=1b6 items=1 ppid=3436 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.294000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:57:13.294000 audit: PATH item=0 name="/dev/fd/63" inode=24912 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.319000 audit[3495]: AVC avc: denied { write } for pid=3495 comm="tee" name="fd" dev="proc" ino=24937 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.320000 audit[3493]: AVC avc: denied { write } for pid=3493 comm="tee" name="fd" dev="proc" ino=24940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.323000 audit[3491]: AVC avc: denied { write } for pid=3491 comm="tee" name="fd" dev="proc" ino=24943 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.323000 audit[3491]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff81c396d a2=241 a3=1b6 items=1 ppid=3445 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.323000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:57:13.323000 audit: PATH item=0 name="/dev/fd/63" inode=24929 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.323000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.320000 audit[3493]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2c8595e a2=241 a3=1b6 items=1 ppid=3434 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.320000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:57:13.320000 audit: PATH item=0 name="/dev/fd/63" inode=24930 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.320000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.319000 audit[3495]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc8c396d a2=241 a3=1b6 items=1 ppid=3431 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.319000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:57:13.319000 audit: PATH item=0 name="/dev/fd/63" inode=24932 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.319000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.344000 audit[3500]: AVC avc: denied { write } for pid=3500 comm="tee" name="fd" dev="proc" ino=23900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:57:13.344000 audit[3500]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbe3895d a2=241 a3=1b6 items=1 ppid=3437 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.344000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:57:13.344000 audit: PATH item=0 name="/dev/fd/63" inode=23897 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:13.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit: BPF prog-id=146 op=LOAD Feb 9 09:57:13.850000 audit[3572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc88e1f08 a2=70 a3=0 items=0 ppid=3433 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:13.850000 audit: BPF prog-id=146 op=UNLOAD Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit: BPF prog-id=147 op=LOAD Feb 9 09:57:13.850000 audit[3572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc88e1f08 a2=70 a3=4a174c items=0 ppid=3433 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:13.850000 audit: BPF prog-id=147 op=UNLOAD Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc88e1f38 a2=70 a3=3eef779f items=0 ppid=3433 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.850000 audit: BPF prog-id=148 op=LOAD Feb 9 09:57:13.850000 audit[3572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc88e1e88 a2=70 a3=3eef77b9 items=0 ppid=3433 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:57:13.853000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.853000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe88545e8 a2=70 a3=0 items=0 ppid=3433 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:57:13.853000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:13.853000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe88544c8 a2=70 a3=2 items=0 ppid=3433 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:13.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:57:13.861000 audit: BPF prog-id=148 op=UNLOAD Feb 9 09:57:14.477000 audit[3606]: NETFILTER_CFG table=mangle:100 family=2 entries=19 op=nft_register_chain pid=3606 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:14.477000 audit[3606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffee822a90 a2=0 a3=ffff946c4fa8 items=0 ppid=3433 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:14.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:14.484000 audit[3604]: NETFILTER_CFG table=nat:101 family=2 entries=16 op=nft_register_chain pid=3604 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:14.484000 audit[3604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffcac79c00 a2=0 a3=ffff8adcafa8 items=0 ppid=3433 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:14.484000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:14.487000 audit[3610]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3610 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:14.487000 audit[3610]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd3456eb0 a2=0 a3=ffffae114fa8 items=0 ppid=3433 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:14.487000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:14.496000 audit[3605]: NETFILTER_CFG table=raw:103 family=2 entries=19 op=nft_register_chain pid=3605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:14.496000 audit[3605]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc4a257b0 a2=0 a3=ffffa5980fa8 items=0 ppid=3433 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:14.496000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:14.609977 systemd-networkd[1501]: vxlan.calico: Link UP Feb 9 09:57:14.609984 systemd-networkd[1501]: vxlan.calico: Gained carrier Feb 9 09:57:14.751986 env[1354]: time="2024-02-09T09:57:14.751943051Z" level=info msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.808 [INFO][3630] k8s.go 578: Cleaning up netns ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.808 [INFO][3630] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" iface="eth0" netns="/var/run/netns/cni-1bd1448e-ea23-9805-4cbe-fc7fa2b8e63e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.808 [INFO][3630] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" iface="eth0" netns="/var/run/netns/cni-1bd1448e-ea23-9805-4cbe-fc7fa2b8e63e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.809 [INFO][3630] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" iface="eth0" netns="/var/run/netns/cni-1bd1448e-ea23-9805-4cbe-fc7fa2b8e63e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.809 [INFO][3630] k8s.go 585: Releasing IP address(es) ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.809 [INFO][3630] utils.go 188: Calico CNI releasing IP address ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.828 [INFO][3636] ipam_plugin.go 415: Releasing address using handleID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.828 [INFO][3636] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.828 [INFO][3636] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.837 [WARNING][3636] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.837 [INFO][3636] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.839 [INFO][3636] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:14.841964 env[1354]: 2024-02-09 09:57:14.840 [INFO][3630] k8s.go 591: Teardown processing complete. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:14.845116 env[1354]: time="2024-02-09T09:57:14.844192041Z" level=info msg="TearDown network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" successfully" Feb 9 09:57:14.845116 env[1354]: time="2024-02-09T09:57:14.844229202Z" level=info msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" returns successfully" Feb 9 09:57:14.843906 systemd[1]: run-netns-cni\x2d1bd1448e\x2dea23\x2d9805\x2d4cbe\x2dfc7fa2b8e63e.mount: Deactivated successfully. Feb 9 09:57:14.845900 env[1354]: time="2024-02-09T09:57:14.845867522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dplm2,Uid:4c306363-d8b2-4748-ba56-4ceeadd41ddf,Namespace:calico-system,Attempt:1,}" Feb 9 09:57:14.989824 systemd-networkd[1501]: cali7288a312b2e: Link UP Feb 9 09:57:15.005467 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:15.005585 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7288a312b2e: link becomes ready Feb 9 09:57:15.006513 systemd-networkd[1501]: cali7288a312b2e: Gained carrier Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.921 [INFO][3643] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0 csi-node-driver- calico-system 4c306363-d8b2-4748-ba56-4ceeadd41ddf 676 0 2024-02-09 09:56:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 csi-node-driver-dplm2 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7288a312b2e [] []}} ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.921 [INFO][3643] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.949 [INFO][3656] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" HandleID="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.963 [INFO][3656] ipam_plugin.go 268: Auto assigning IP ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" HandleID="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b9e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"csi-node-driver-dplm2", "timestamp":"2024-02-09 09:57:14.949639197 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.963 [INFO][3656] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.963 [INFO][3656] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.963 [INFO][3656] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.964 [INFO][3656] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.968 [INFO][3656] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.972 [INFO][3656] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.973 [INFO][3656] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.975 [INFO][3656] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.975 [INFO][3656] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.977 [INFO][3656] ipam.go 1682: Creating new handle: k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10 Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.980 [INFO][3656] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.984 [INFO][3656] ipam.go 1216: Successfully claimed IPs: [192.168.123.65/26] block=192.168.123.64/26 handle="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.984 [INFO][3656] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.65/26] handle="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.984 [INFO][3656] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:15.019237 env[1354]: 2024-02-09 09:57:14.984 [INFO][3656] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.65/26] IPv6=[] ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" HandleID="k8s-pod-network.e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:14.987 [INFO][3643] k8s.go 385: Populated endpoint ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c306363-d8b2-4748-ba56-4ceeadd41ddf", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"csi-node-driver-dplm2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7288a312b2e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:14.987 [INFO][3643] k8s.go 386: Calico CNI using IPs: [192.168.123.65/32] ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:14.987 [INFO][3643] dataplane_linux.go 68: Setting the host side veth name to cali7288a312b2e ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:15.007 [INFO][3643] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:15.008 [INFO][3643] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c306363-d8b2-4748-ba56-4ceeadd41ddf", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10", Pod:"csi-node-driver-dplm2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7288a312b2e", MAC:"16:4a:49:83:d7:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:15.019844 env[1354]: 2024-02-09 09:57:15.017 [INFO][3643] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10" Namespace="calico-system" Pod="csi-node-driver-dplm2" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:15.038000 audit[3676]: NETFILTER_CFG table=filter:104 family=2 entries=36 op=nft_register_chain pid=3676 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:15.038000 audit[3676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffffd730860 a2=0 a3=ffff9e112fa8 items=0 ppid=3433 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:15.044558 env[1354]: time="2024-02-09T09:57:15.044466880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:15.044558 env[1354]: time="2024-02-09T09:57:15.044525361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:15.044741 env[1354]: time="2024-02-09T09:57:15.044535721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:15.044741 env[1354]: time="2024-02-09T09:57:15.044693885Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10 pid=3685 runtime=io.containerd.runc.v2 Feb 9 09:57:15.058047 systemd[1]: Started cri-containerd-e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10.scope. Feb 9 09:57:15.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.073000 audit: BPF prog-id=149 op=LOAD Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666338363937316162623564393437396638353266326234666163 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666338363937316162623564393437396638353266326234666163 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit: BPF prog-id=150 op=LOAD Feb 9 09:57:15.074000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666338363937316162623564393437396638353266326234666163 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit: BPF prog-id=151 op=LOAD Feb 9 09:57:15.074000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666338363937316162623564393437396638353266326234666163 Feb 9 09:57:15.074000 audit: BPF prog-id=151 op=UNLOAD Feb 9 09:57:15.074000 audit: BPF prog-id=150 op=UNLOAD Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:15.074000 audit: BPF prog-id=152 op=LOAD Feb 9 09:57:15.074000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3685 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:15.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666338363937316162623564393437396638353266326234666163 Feb 9 09:57:15.089291 env[1354]: time="2024-02-09T09:57:15.088693397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dplm2,Uid:4c306363-d8b2-4748-ba56-4ceeadd41ddf,Namespace:calico-system,Attempt:1,} returns sandbox id \"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10\"" Feb 9 09:57:15.092383 env[1354]: time="2024-02-09T09:57:15.092348366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:57:15.844055 systemd[1]: run-containerd-runc-k8s.io-e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10-runc.LPGsbu.mount: Deactivated successfully. Feb 9 09:57:15.852494 systemd-networkd[1501]: vxlan.calico: Gained IPv6LL Feb 9 09:57:16.364443 systemd-networkd[1501]: cali7288a312b2e: Gained IPv6LL Feb 9 09:57:17.440039 env[1354]: time="2024-02-09T09:57:17.439999517Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:17.448143 env[1354]: time="2024-02-09T09:57:17.448093951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:17.452944 env[1354]: time="2024-02-09T09:57:17.452909065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:17.456632 env[1354]: time="2024-02-09T09:57:17.456601474Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:17.457002 env[1354]: time="2024-02-09T09:57:17.456970322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 09:57:17.459510 env[1354]: time="2024-02-09T09:57:17.459477062Z" level=info msg="CreateContainer within sandbox \"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:57:17.490604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1223258181.mount: Deactivated successfully. Feb 9 09:57:17.506440 env[1354]: time="2024-02-09T09:57:17.506382661Z" level=info msg="CreateContainer within sandbox \"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"49f72453f21c6f38163c3f7b4b93547f4ba3d38fe6058b3028eef6ed6a86997c\"" Feb 9 09:57:17.508414 env[1354]: time="2024-02-09T09:57:17.508348988Z" level=info msg="StartContainer for \"49f72453f21c6f38163c3f7b4b93547f4ba3d38fe6058b3028eef6ed6a86997c\"" Feb 9 09:57:17.526540 systemd[1]: Started cri-containerd-49f72453f21c6f38163c3f7b4b93547f4ba3d38fe6058b3028eef6ed6a86997c.scope. Feb 9 09:57:17.550000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.557342 kernel: kauditd_printk_skb: 189 callbacks suppressed Feb 9 09:57:17.557432 kernel: audit: type=1400 audit(1707472637.550:1190): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.550000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3685 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.605996 kernel: audit: type=1300 audit(1707472637.550:1190): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3685 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.606095 kernel: audit: type=1327 audit(1707472637.550:1190): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663732343533663231633666333831363363336637623462393335 Feb 9 09:57:17.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663732343533663231633666333831363363336637623462393335 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.654363 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.674797 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.693901 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.715655 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.737150 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.737253 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.759077 env[1354]: time="2024-02-09T09:57:17.759029770Z" level=info msg="StartContainer for \"49f72453f21c6f38163c3f7b4b93547f4ba3d38fe6058b3028eef6ed6a86997c\" returns successfully" Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.779204 kernel: audit: type=1400 audit(1707472637.555:1191): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.555000 audit: BPF prog-id=153 op=LOAD Feb 9 09:57:17.555000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3685 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663732343533663231633666333831363363336637623462393335 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.556000 audit: BPF prog-id=154 op=LOAD Feb 9 09:57:17.556000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3685 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663732343533663231633666333831363363336637623462393335 Feb 9 09:57:17.576000 audit: BPF prog-id=154 op=UNLOAD Feb 9 09:57:17.576000 audit: BPF prog-id=153 op=UNLOAD Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:17.576000 audit: BPF prog-id=155 op=LOAD Feb 9 09:57:17.576000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3685 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:17.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663732343533663231633666333831363363336637623462393335 Feb 9 09:57:17.782084 env[1354]: time="2024-02-09T09:57:17.782027759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 09:57:19.753144 env[1354]: time="2024-02-09T09:57:19.753082492Z" level=info msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" Feb 9 09:57:19.768575 env[1354]: time="2024-02-09T09:57:19.768538334Z" level=info msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" Feb 9 09:57:19.768839 env[1354]: time="2024-02-09T09:57:19.768796620Z" level=info msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" Feb 9 09:57:19.854129 env[1354]: time="2024-02-09T09:57:19.854083136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:19.862342 env[1354]: time="2024-02-09T09:57:19.862290208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:19.866580 env[1354]: time="2024-02-09T09:57:19.866215020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:19.871773 env[1354]: time="2024-02-09T09:57:19.871733309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:19.884179 env[1354]: time="2024-02-09T09:57:19.884133479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 09:57:19.896208 env[1354]: time="2024-02-09T09:57:19.896166841Z" level=info msg="CreateContainer within sandbox \"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 09:57:19.942818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3645456922.mount: Deactivated successfully. Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.831 [INFO][3798] k8s.go 578: Cleaning up netns ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.831 [INFO][3798] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" iface="eth0" netns="/var/run/netns/cni-09cdf873-0e01-cc8c-0ba5-a451ec588829" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.832 [INFO][3798] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" iface="eth0" netns="/var/run/netns/cni-09cdf873-0e01-cc8c-0ba5-a451ec588829" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.834 [INFO][3798] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" iface="eth0" netns="/var/run/netns/cni-09cdf873-0e01-cc8c-0ba5-a451ec588829" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.834 [INFO][3798] k8s.go 585: Releasing IP address(es) ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.834 [INFO][3798] utils.go 188: Calico CNI releasing IP address ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.910 [INFO][3816] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.911 [INFO][3816] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.911 [INFO][3816] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.937 [WARNING][3816] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.937 [INFO][3816] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.943 [INFO][3816] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:19.950239 env[1354]: 2024-02-09 09:57:19.946 [INFO][3798] k8s.go 591: Teardown processing complete. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:19.952774 systemd[1]: run-netns-cni\x2d09cdf873\x2d0e01\x2dcc8c\x2d0ba5\x2da451ec588829.mount: Deactivated successfully. Feb 9 09:57:19.955626 env[1354]: time="2024-02-09T09:57:19.954413604Z" level=info msg="TearDown network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" successfully" Feb 9 09:57:19.955626 env[1354]: time="2024-02-09T09:57:19.954454565Z" level=info msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" returns successfully" Feb 9 09:57:19.955989 env[1354]: time="2024-02-09T09:57:19.955961320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b46bf9566-x7cs5,Uid:63e62d1c-7013-46ac-8386-69127cbc8a8b,Namespace:calico-system,Attempt:1,}" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.854 [INFO][3797] k8s.go 578: Cleaning up netns ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.855 [INFO][3797] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" iface="eth0" netns="/var/run/netns/cni-87e606ed-d553-e8e0-c6b3-a98cd1bac4c7" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.855 [INFO][3797] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" iface="eth0" netns="/var/run/netns/cni-87e606ed-d553-e8e0-c6b3-a98cd1bac4c7" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.855 [INFO][3797] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" iface="eth0" netns="/var/run/netns/cni-87e606ed-d553-e8e0-c6b3-a98cd1bac4c7" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.855 [INFO][3797] k8s.go 585: Releasing IP address(es) ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.855 [INFO][3797] utils.go 188: Calico CNI releasing IP address ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.930 [INFO][3822] ipam_plugin.go 415: Releasing address using handleID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.930 [INFO][3822] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.943 [INFO][3822] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.956 [WARNING][3822] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.956 [INFO][3822] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.958 [INFO][3822] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:19.966254 env[1354]: 2024-02-09 09:57:19.964 [INFO][3797] k8s.go 591: Teardown processing complete. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:19.969889 env[1354]: time="2024-02-09T09:57:19.969178309Z" level=info msg="TearDown network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" successfully" Feb 9 09:57:19.969889 env[1354]: time="2024-02-09T09:57:19.969218190Z" level=info msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" returns successfully" Feb 9 09:57:19.968198 systemd[1]: run-netns-cni\x2d87e606ed\x2dd553\x2de8e0\x2dc6b3\x2da98cd1bac4c7.mount: Deactivated successfully. Feb 9 09:57:19.970320 env[1354]: time="2024-02-09T09:57:19.970282335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z6xr8,Uid:ad2fe95e-e733-40d2-9159-940d3d488021,Namespace:kube-system,Attempt:1,}" Feb 9 09:57:19.970789 env[1354]: time="2024-02-09T09:57:19.970759706Z" level=info msg="CreateContainer within sandbox \"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0e55e219e853083b4c746a29f8c22b04777fca6a5906a2759a03e18f4d62d3a0\"" Feb 9 09:57:19.978897 env[1354]: time="2024-02-09T09:57:19.978857976Z" level=info msg="StartContainer for \"0e55e219e853083b4c746a29f8c22b04777fca6a5906a2759a03e18f4d62d3a0\"" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.885 [INFO][3809] k8s.go 578: Cleaning up netns ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.885 [INFO][3809] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" iface="eth0" netns="/var/run/netns/cni-038caf22-f577-80bf-ef46-2fbc74ace5bf" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.886 [INFO][3809] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" iface="eth0" netns="/var/run/netns/cni-038caf22-f577-80bf-ef46-2fbc74ace5bf" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.886 [INFO][3809] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" iface="eth0" netns="/var/run/netns/cni-038caf22-f577-80bf-ef46-2fbc74ace5bf" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.886 [INFO][3809] k8s.go 585: Releasing IP address(es) ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.887 [INFO][3809] utils.go 188: Calico CNI releasing IP address ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.934 [INFO][3828] ipam_plugin.go 415: Releasing address using handleID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.935 [INFO][3828] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.958 [INFO][3828] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.978 [WARNING][3828] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.978 [INFO][3828] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.980 [INFO][3828] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:19.984695 env[1354]: 2024-02-09 09:57:19.983 [INFO][3809] k8s.go 591: Teardown processing complete. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:19.987514 systemd[1]: run-netns-cni\x2d038caf22\x2df577\x2d80bf\x2def46\x2d2fbc74ace5bf.mount: Deactivated successfully. Feb 9 09:57:19.987963 env[1354]: time="2024-02-09T09:57:19.987929348Z" level=info msg="TearDown network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" successfully" Feb 9 09:57:19.988446 env[1354]: time="2024-02-09T09:57:19.988420239Z" level=info msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" returns successfully" Feb 9 09:57:19.989938 env[1354]: time="2024-02-09T09:57:19.989895914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rs9xj,Uid:b7875f62-26d8-4cbc-b848-01725b8d995a,Namespace:kube-system,Attempt:1,}" Feb 9 09:57:20.000954 systemd[1]: Started cri-containerd-0e55e219e853083b4c746a29f8c22b04777fca6a5906a2759a03e18f4d62d3a0.scope. Feb 9 09:57:20.019000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.019000 audit[3847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3685 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353565323139653835333038336234633734366132396638633232 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.020000 audit: BPF prog-id=156 op=LOAD Feb 9 09:57:20.020000 audit[3847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3685 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353565323139653835333038336234633734366132396638633232 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.021000 audit: BPF prog-id=157 op=LOAD Feb 9 09:57:20.021000 audit[3847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3685 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353565323139653835333038336234633734366132396638633232 Feb 9 09:57:20.021000 audit: BPF prog-id=157 op=UNLOAD Feb 9 09:57:20.021000 audit: BPF prog-id=156 op=UNLOAD Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.022000 audit: BPF prog-id=158 op=LOAD Feb 9 09:57:20.022000 audit[3847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3685 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353565323139653835333038336234633734366132396638633232 Feb 9 09:57:20.045818 env[1354]: time="2024-02-09T09:57:20.045780372Z" level=info msg="StartContainer for \"0e55e219e853083b4c746a29f8c22b04777fca6a5906a2759a03e18f4d62d3a0\" returns successfully" Feb 9 09:57:20.244015 systemd-networkd[1501]: calic09ea207d7f: Link UP Feb 9 09:57:20.264944 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:20.265137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic09ea207d7f: link becomes ready Feb 9 09:57:20.266855 systemd-networkd[1501]: calic09ea207d7f: Gained carrier Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.100 [INFO][3880] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0 calico-kube-controllers-b46bf9566- calico-system 63e62d1c-7013-46ac-8386-69127cbc8a8b 696 0 2024-02-09 09:56:50 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b46bf9566 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 calico-kube-controllers-b46bf9566-x7cs5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic09ea207d7f [] []}} ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.100 [INFO][3880] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.166 [INFO][3912] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" HandleID="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.182 [INFO][3912] ipam_plugin.go 268: Auto assigning IP ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" HandleID="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000118080), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"calico-kube-controllers-b46bf9566-x7cs5", "timestamp":"2024-02-09 09:57:20.166202603 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.188 [INFO][3912] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.188 [INFO][3912] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.188 [INFO][3912] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.196 [INFO][3912] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.201 [INFO][3912] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.205 [INFO][3912] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.207 [INFO][3912] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.220 [INFO][3912] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.220 [INFO][3912] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.222 [INFO][3912] ipam.go 1682: Creating new handle: k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.225 [INFO][3912] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.231 [INFO][3912] ipam.go 1216: Successfully claimed IPs: [192.168.123.66/26] block=192.168.123.64/26 handle="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.231 [INFO][3912] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.66/26] handle="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.231 [INFO][3912] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:20.277420 env[1354]: 2024-02-09 09:57:20.231 [INFO][3912] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.66/26] IPv6=[] ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" HandleID="k8s-pod-network.0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.233 [INFO][3880] k8s.go 385: Populated endpoint ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0", GenerateName:"calico-kube-controllers-b46bf9566-", Namespace:"calico-system", SelfLink:"", UID:"63e62d1c-7013-46ac-8386-69127cbc8a8b", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b46bf9566", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"calico-kube-controllers-b46bf9566-x7cs5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic09ea207d7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.233 [INFO][3880] k8s.go 386: Calico CNI using IPs: [192.168.123.66/32] ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.233 [INFO][3880] dataplane_linux.go 68: Setting the host side veth name to calic09ea207d7f ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.266 [INFO][3880] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.266 [INFO][3880] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0", GenerateName:"calico-kube-controllers-b46bf9566-", Namespace:"calico-system", SelfLink:"", UID:"63e62d1c-7013-46ac-8386-69127cbc8a8b", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b46bf9566", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e", Pod:"calico-kube-controllers-b46bf9566-x7cs5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic09ea207d7f", MAC:"5a:dc:84:ca:db:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.278046 env[1354]: 2024-02-09 09:57:20.275 [INFO][3880] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e" Namespace="calico-system" Pod="calico-kube-controllers-b46bf9566-x7cs5" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:20.300597 env[1354]: time="2024-02-09T09:57:20.300526797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:20.300597 env[1354]: time="2024-02-09T09:57:20.300564798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:20.300797 env[1354]: time="2024-02-09T09:57:20.300575198Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:20.300797 env[1354]: time="2024-02-09T09:57:20.300765923Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e pid=3962 runtime=io.containerd.runc.v2 Feb 9 09:57:20.315474 systemd-networkd[1501]: calief7df1d2e0e: Link UP Feb 9 09:57:20.319000 audit[3974]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:20.319000 audit[3974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18320 a0=3 a1=ffffed7fac60 a2=0 a3=ffff979cbfa8 items=0 ppid=3433 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:20.326634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calief7df1d2e0e: link becomes ready Feb 9 09:57:20.326438 systemd-networkd[1501]: calief7df1d2e0e: Gained carrier Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.145 [INFO][3885] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0 coredns-5dd5756b68- kube-system ad2fe95e-e733-40d2-9159-940d3d488021 697 0 2024-02-09 09:56:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 coredns-5dd5756b68-z6xr8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calief7df1d2e0e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.146 [INFO][3885] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.184 [INFO][3928] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" HandleID="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.203 [INFO][3928] ipam_plugin.go 268: Auto assigning IP ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" HandleID="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bcde0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"coredns-5dd5756b68-z6xr8", "timestamp":"2024-02-09 09:57:20.184832475 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.203 [INFO][3928] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.231 [INFO][3928] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.231 [INFO][3928] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.239 [INFO][3928] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.252 [INFO][3928] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.276 [INFO][3928] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.283 [INFO][3928] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.286 [INFO][3928] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.286 [INFO][3928] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.288 [INFO][3928] ipam.go 1682: Creating new handle: k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.293 [INFO][3928] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.304 [INFO][3928] ipam.go 1216: Successfully claimed IPs: [192.168.123.67/26] block=192.168.123.64/26 handle="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.304 [INFO][3928] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.67/26] handle="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.304 [INFO][3928] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:20.343452 env[1354]: 2024-02-09 09:57:20.304 [INFO][3928] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.67/26] IPv6=[] ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" HandleID="k8s-pod-network.ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.310 [INFO][3885] k8s.go 385: Populated endpoint ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ad2fe95e-e733-40d2-9159-940d3d488021", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"coredns-5dd5756b68-z6xr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief7df1d2e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.310 [INFO][3885] k8s.go 386: Calico CNI using IPs: [192.168.123.67/32] ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.310 [INFO][3885] dataplane_linux.go 68: Setting the host side veth name to calief7df1d2e0e ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.327 [INFO][3885] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.328 [INFO][3885] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ad2fe95e-e733-40d2-9159-940d3d488021", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d", Pod:"coredns-5dd5756b68-z6xr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief7df1d2e0e", MAC:"ea:74:d7:25:47:20", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.344056 env[1354]: 2024-02-09 09:57:20.341 [INFO][3885] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d" Namespace="kube-system" Pod="coredns-5dd5756b68-z6xr8" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:20.350392 systemd[1]: Started cri-containerd-0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e.scope. Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.374000 audit: BPF prog-id=159 op=LOAD Feb 9 09:57:20.378572 systemd-networkd[1501]: calid5ede9d6acc: Link UP Feb 9 09:57:20.378000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.389719 env[1354]: time="2024-02-09T09:57:20.385776773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:20.389719 env[1354]: time="2024-02-09T09:57:20.385813414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:20.389719 env[1354]: time="2024-02-09T09:57:20.385823454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:20.389719 env[1354]: time="2024-02-09T09:57:20.385929537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d pid=4014 runtime=io.containerd.runc.v2 Feb 9 09:57:20.378000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3962 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066616565623733343735643335653263316332366330666138666465 Feb 9 09:57:20.389000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.389000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3962 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.391472 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5ede9d6acc: link becomes ready Feb 9 09:57:20.391341 systemd-networkd[1501]: calid5ede9d6acc: Gained carrier Feb 9 09:57:20.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066616565623733343735643335653263316332366330666138666465 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.390000 audit: BPF prog-id=160 op=LOAD Feb 9 09:57:20.390000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3962 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066616565623733343735643335653263316332366330666138666465 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.393000 audit: BPF prog-id=161 op=LOAD Feb 9 09:57:20.393000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3962 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066616565623733343735643335653263316332366330666138666465 Feb 9 09:57:20.396000 audit: BPF prog-id=161 op=UNLOAD Feb 9 09:57:20.397000 audit: BPF prog-id=160 op=UNLOAD Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.397000 audit: BPF prog-id=162 op=LOAD Feb 9 09:57:20.397000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3962 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066616565623733343735643335653263316332366330666138666465 Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.142 [INFO][3900] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0 coredns-5dd5756b68- kube-system b7875f62-26d8-4cbc-b848-01725b8d995a 698 0 2024-02-09 09:56:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 coredns-5dd5756b68-rs9xj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid5ede9d6acc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.142 [INFO][3900] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.206 [INFO][3923] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" HandleID="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.222 [INFO][3923] ipam_plugin.go 268: Auto assigning IP ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" HandleID="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd950), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"coredns-5dd5756b68-rs9xj", "timestamp":"2024-02-09 09:57:20.206497377 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.222 [INFO][3923] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.304 [INFO][3923] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.304 [INFO][3923] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.306 [INFO][3923] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.330 [INFO][3923] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.334 [INFO][3923] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.336 [INFO][3923] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.348 [INFO][3923] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.348 [INFO][3923] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.353 [INFO][3923] ipam.go 1682: Creating new handle: k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.357 [INFO][3923] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.364 [INFO][3923] ipam.go 1216: Successfully claimed IPs: [192.168.123.68/26] block=192.168.123.64/26 handle="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.364 [INFO][3923] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.68/26] handle="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.364 [INFO][3923] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:20.405455 env[1354]: 2024-02-09 09:57:20.364 [INFO][3923] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.68/26] IPv6=[] ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" HandleID="k8s-pod-network.24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.365 [INFO][3900] k8s.go 385: Populated endpoint ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b7875f62-26d8-4cbc-b848-01725b8d995a", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"coredns-5dd5756b68-rs9xj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid5ede9d6acc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.365 [INFO][3900] k8s.go 386: Calico CNI using IPs: [192.168.123.68/32] ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.365 [INFO][3900] dataplane_linux.go 68: Setting the host side veth name to calid5ede9d6acc ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.393 [INFO][3900] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.394 [INFO][3900] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b7875f62-26d8-4cbc-b848-01725b8d995a", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c", Pod:"coredns-5dd5756b68-rs9xj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid5ede9d6acc", MAC:"3e:e2:e6:8a:32:24", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:20.406015 env[1354]: 2024-02-09 09:57:20.404 [INFO][3900] k8s.go 491: Wrote updated endpoint to datastore ContainerID="24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c" Namespace="kube-system" Pod="coredns-5dd5756b68-rs9xj" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:20.423891 systemd[1]: Started cri-containerd-ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d.scope. Feb 9 09:57:20.431856 env[1354]: time="2024-02-09T09:57:20.431764599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:20.431856 env[1354]: time="2024-02-09T09:57:20.431809160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:20.431856 env[1354]: time="2024-02-09T09:57:20.431819360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:20.432058 env[1354]: time="2024-02-09T09:57:20.431964284Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c pid=4049 runtime=io.containerd.runc.v2 Feb 9 09:57:20.440000 audit[4065]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:20.440000 audit[4065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffe8070370 a2=0 a3=ffff876a5fa8 items=0 ppid=3433 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.440000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:20.446916 systemd[1]: Started cri-containerd-24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c.scope. Feb 9 09:57:20.463041 env[1354]: time="2024-02-09T09:57:20.463002803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b46bf9566-x7cs5,Uid:63e62d1c-7013-46ac-8386-69127cbc8a8b,Namespace:calico-system,Attempt:1,} returns sandbox id \"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e\"" Feb 9 09:57:20.464733 env[1354]: time="2024-02-09T09:57:20.464692002Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.467000 audit: BPF prog-id=163 op=LOAD Feb 9 09:57:20.468000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.468000 audit[4026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4014 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616131383531313638646436343330376161363434613533656663 Feb 9 09:57:20.468000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.468000 audit[4026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4014 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616131383531313638646436343330376161363434613533656663 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.470000 audit: BPF prog-id=164 op=LOAD Feb 9 09:57:20.470000 audit[4026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4014 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616131383531313638646436343330376161363434613533656663 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit: BPF prog-id=165 op=LOAD Feb 9 09:57:20.471000 audit[4026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4014 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616131383531313638646436343330376161363434613533656663 Feb 9 09:57:20.471000 audit: BPF prog-id=165 op=UNLOAD Feb 9 09:57:20.471000 audit: BPF prog-id=164 op=UNLOAD Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.471000 audit: BPF prog-id=166 op=LOAD Feb 9 09:57:20.471000 audit[4026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4014 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616131383531313638646436343330376161363434613533656663 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.480000 audit: BPF prog-id=167 op=LOAD Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4049 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234636436663765326632373732343539336433356132316539393961 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4049 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234636436663765326632373732343539336433356132316539393961 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit: BPF prog-id=168 op=LOAD Feb 9 09:57:20.481000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4049 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234636436663765326632373732343539336433356132316539393961 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit: BPF prog-id=169 op=LOAD Feb 9 09:57:20.481000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4049 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234636436663765326632373732343539336433356132316539393961 Feb 9 09:57:20.481000 audit: BPF prog-id=169 op=UNLOAD Feb 9 09:57:20.481000 audit: BPF prog-id=168 op=UNLOAD Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.481000 audit: BPF prog-id=170 op=LOAD Feb 9 09:57:20.481000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4049 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234636436663765326632373732343539336433356132316539393961 Feb 9 09:57:20.497000 audit[4087]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:20.497000 audit[4087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=ffffff133ce0 a2=0 a3=ffffa689ffa8 items=0 ppid=3433 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:20.512073 env[1354]: time="2024-02-09T09:57:20.512031580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z6xr8,Uid:ad2fe95e-e733-40d2-9159-940d3d488021,Namespace:kube-system,Attempt:1,} returns sandbox id \"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d\"" Feb 9 09:57:20.515572 env[1354]: time="2024-02-09T09:57:20.515527741Z" level=info msg="CreateContainer within sandbox \"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:57:20.526118 env[1354]: time="2024-02-09T09:57:20.521613802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-rs9xj,Uid:b7875f62-26d8-4cbc-b848-01725b8d995a,Namespace:kube-system,Attempt:1,} returns sandbox id \"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c\"" Feb 9 09:57:20.529125 env[1354]: time="2024-02-09T09:57:20.529089975Z" level=info msg="CreateContainer within sandbox \"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:57:20.573245 env[1354]: time="2024-02-09T09:57:20.573201558Z" level=info msg="CreateContainer within sandbox \"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7929403b16a7f81ffbeeca0a393bef1125e4b49580e0417b7c09134c8c5b9872\"" Feb 9 09:57:20.574160 env[1354]: time="2024-02-09T09:57:20.574121579Z" level=info msg="StartContainer for \"7929403b16a7f81ffbeeca0a393bef1125e4b49580e0417b7c09134c8c5b9872\"" Feb 9 09:57:20.578442 env[1354]: time="2024-02-09T09:57:20.578398758Z" level=info msg="CreateContainer within sandbox \"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"efd2590af6b20c83c00aa5df66a196fc19afe6591f92d2c9732d3bcec2e834f8\"" Feb 9 09:57:20.578977 env[1354]: time="2024-02-09T09:57:20.578908610Z" level=info msg="StartContainer for \"efd2590af6b20c83c00aa5df66a196fc19afe6591f92d2c9732d3bcec2e834f8\"" Feb 9 09:57:20.593725 systemd[1]: Started cri-containerd-7929403b16a7f81ffbeeca0a393bef1125e4b49580e0417b7c09134c8c5b9872.scope. Feb 9 09:57:20.608870 systemd[1]: Started cri-containerd-efd2590af6b20c83c00aa5df66a196fc19afe6591f92d2c9732d3bcec2e834f8.scope. Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.612000 audit: BPF prog-id=171 op=LOAD Feb 9 09:57:20.613000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.613000 audit[4115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4049 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323934303362313661376638316666626565636130613339336265 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4049 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323934303362313661376638316666626565636130613339336265 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.614000 audit: BPF prog-id=172 op=LOAD Feb 9 09:57:20.614000 audit[4115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4049 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323934303362313661376638316666626565636130613339336265 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit: BPF prog-id=173 op=LOAD Feb 9 09:57:20.615000 audit[4115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4049 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323934303362313661376638316666626565636130613339336265 Feb 9 09:57:20.615000 audit: BPF prog-id=173 op=UNLOAD Feb 9 09:57:20.615000 audit: BPF prog-id=172 op=UNLOAD Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { perfmon } for pid=4115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit[4115]: AVC avc: denied { bpf } for pid=4115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.615000 audit: BPF prog-id=174 op=LOAD Feb 9 09:57:20.615000 audit[4115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4049 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323934303362313661376638316666626565636130613339336265 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.620000 audit: BPF prog-id=175 op=LOAD Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4014 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643235393061663662323063383363303061613564663636613139 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4014 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643235393061663662323063383363303061613564663636613139 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.621000 audit: BPF prog-id=176 op=LOAD Feb 9 09:57:20.621000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4014 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643235393061663662323063383363303061613564663636613139 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit: BPF prog-id=177 op=LOAD Feb 9 09:57:20.622000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4014 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643235393061663662323063383363303061613564663636613139 Feb 9 09:57:20.622000 audit: BPF prog-id=177 op=UNLOAD Feb 9 09:57:20.622000 audit: BPF prog-id=176 op=UNLOAD Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:20.622000 audit: BPF prog-id=178 op=LOAD Feb 9 09:57:20.622000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4014 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643235393061663662323063383363303061613564663636613139 Feb 9 09:57:20.650697 env[1354]: time="2024-02-09T09:57:20.650640993Z" level=info msg="StartContainer for \"7929403b16a7f81ffbeeca0a393bef1125e4b49580e0417b7c09134c8c5b9872\" returns successfully" Feb 9 09:57:20.652877 env[1354]: time="2024-02-09T09:57:20.652824964Z" level=info msg="StartContainer for \"efd2590af6b20c83c00aa5df66a196fc19afe6591f92d2c9732d3bcec2e834f8\" returns successfully" Feb 9 09:57:20.839927 kubelet[2478]: I0209 09:57:20.839840 2478 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 09:57:20.839927 kubelet[2478]: I0209 09:57:20.839879 2478 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 09:57:20.956347 kubelet[2478]: I0209 09:57:20.956286 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-dplm2" podStartSLOduration=26.1600361 podCreationTimestamp="2024-02-09 09:56:50 +0000 UTC" firstStartedPulling="2024-02-09 09:57:15.091861394 +0000 UTC m=+45.478659770" lastFinishedPulling="2024-02-09 09:57:19.888059411 +0000 UTC m=+50.274857787" observedRunningTime="2024-02-09 09:57:20.9218526 +0000 UTC m=+51.308650936" watchObservedRunningTime="2024-02-09 09:57:20.956234117 +0000 UTC m=+51.343032493" Feb 9 09:57:20.972000 audit[4181]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=4181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:20.972000 audit[4181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffedbdac0 a2=0 a3=ffff860c26c0 items=0 ppid=2654 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:20.978366 kubelet[2478]: I0209 09:57:20.978331 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-rs9xj" podStartSLOduration=36.978282468 podCreationTimestamp="2024-02-09 09:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:20.95681429 +0000 UTC m=+51.343612666" watchObservedRunningTime="2024-02-09 09:57:20.978282468 +0000 UTC m=+51.365080924" Feb 9 09:57:20.974000 audit[4181]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:20.974000 audit[4181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffffedbdac0 a2=0 a3=ffff860c26c0 items=0 ppid=2654 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:20.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.000000 audit[4184]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.000000 audit[4184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc5cf3050 a2=0 a3=ffffaa7a76c0 items=0 ppid=2654 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.020000 audit[4184]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:21.020000 audit[4184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffc5cf3050 a2=0 a3=ffffaa7a76c0 items=0 ppid=2654 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:21.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:21.932441 systemd-networkd[1501]: calief7df1d2e0e: Gained IPv6LL Feb 9 09:57:22.125449 systemd-networkd[1501]: calic09ea207d7f: Gained IPv6LL Feb 9 09:57:22.381567 systemd-networkd[1501]: calid5ede9d6acc: Gained IPv6LL Feb 9 09:57:23.168669 env[1354]: time="2024-02-09T09:57:23.168625944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.175577 env[1354]: time="2024-02-09T09:57:23.175543500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.179544 env[1354]: time="2024-02-09T09:57:23.179514270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.183587 env[1354]: time="2024-02-09T09:57:23.183554041Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:23.183998 env[1354]: time="2024-02-09T09:57:23.183969690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 09:57:23.198589 env[1354]: time="2024-02-09T09:57:23.198553779Z" level=info msg="CreateContainer within sandbox \"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 09:57:23.239652 env[1354]: time="2024-02-09T09:57:23.239607785Z" level=info msg="CreateContainer within sandbox \"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788\"" Feb 9 09:57:23.240511 env[1354]: time="2024-02-09T09:57:23.240476005Z" level=info msg="StartContainer for \"68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788\"" Feb 9 09:57:23.267386 systemd[1]: Started cri-containerd-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788.scope. Feb 9 09:57:23.291590 kernel: kauditd_printk_skb: 382 callbacks suppressed Feb 9 09:57:23.291716 kernel: audit: type=1400 audit(1707472643.284:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.333562 kernel: audit: type=1400 audit(1707472643.284:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.333719 kernel: audit: type=1400 audit(1707472643.284:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.374751 kernel: audit: type=1400 audit(1707472643.284:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.396715 kernel: audit: type=1400 audit(1707472643.284:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.396852 kernel: audit: type=1400 audit(1707472643.284:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.438949 kernel: audit: type=1400 audit(1707472643.284:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.461177 kernel: audit: type=1400 audit(1707472643.284:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.481123 kernel: audit: type=1400 audit(1707472643.284:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.501609 kernel: audit: type=1400 audit(1707472643.290:1308): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.290000 audit: BPF prog-id=179 op=LOAD Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3962 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323439623066616631666636346435333230613234653361306337 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3962 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323439623066616631666636346435333230613234653361306337 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit: BPF prog-id=180 op=LOAD Feb 9 09:57:23.312000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3962 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323439623066616631666636346435333230613234653361306337 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit: BPF prog-id=181 op=LOAD Feb 9 09:57:23.312000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3962 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323439623066616631666636346435333230613234653361306337 Feb 9 09:57:23.312000 audit: BPF prog-id=181 op=UNLOAD Feb 9 09:57:23.312000 audit: BPF prog-id=180 op=UNLOAD Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:23.312000 audit: BPF prog-id=182 op=LOAD Feb 9 09:57:23.312000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3962 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638323439623066616631666636346435333230613234653361306337 Feb 9 09:57:23.507147 env[1354]: time="2024-02-09T09:57:23.507105140Z" level=info msg="StartContainer for \"68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788\" returns successfully" Feb 9 09:57:23.936027 kubelet[2478]: I0209 09:57:23.935994 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-z6xr8" podStartSLOduration=39.935949055 podCreationTimestamp="2024-02-09 09:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:57:20.978666117 +0000 UTC m=+51.365464493" watchObservedRunningTime="2024-02-09 09:57:23.935949055 +0000 UTC m=+54.322747431" Feb 9 09:57:23.981629 kubelet[2478]: I0209 09:57:23.981317 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b46bf9566-x7cs5" podStartSLOduration=31.261353295 podCreationTimestamp="2024-02-09 09:56:50 +0000 UTC" firstStartedPulling="2024-02-09 09:57:20.464386075 +0000 UTC m=+50.851184451" lastFinishedPulling="2024-02-09 09:57:23.184295337 +0000 UTC m=+53.571093713" observedRunningTime="2024-02-09 09:57:23.936687471 +0000 UTC m=+54.323485887" watchObservedRunningTime="2024-02-09 09:57:23.981262557 +0000 UTC m=+54.368060933" Feb 9 09:57:24.189805 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.9pVApt.mount: Deactivated successfully. Feb 9 09:57:25.732000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.732000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ddc390 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:25.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:25.733000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.733000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400117ee40 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:25.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:25.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.869000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40134fcf60 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4013d0f9e0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:25.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.871000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40134fd020 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:25.871000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4012ace9c0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:25.874000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.874000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4013d0fae0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.874000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:25.875000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:25.875000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012ace9f0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:57:25.875000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:57:28.397860 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.9mIZG3.mount: Deactivated successfully. Feb 9 09:57:29.739754 env[1354]: time="2024-02-09T09:57:29.739703042Z" level=info msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.778 [WARNING][4286] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ad2fe95e-e733-40d2-9159-940d3d488021", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d", Pod:"coredns-5dd5756b68-z6xr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief7df1d2e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.778 [INFO][4286] k8s.go 578: Cleaning up netns ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.778 [INFO][4286] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" iface="eth0" netns="" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.778 [INFO][4286] k8s.go 585: Releasing IP address(es) ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.778 [INFO][4286] utils.go 188: Calico CNI releasing IP address ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.796 [INFO][4295] ipam_plugin.go 415: Releasing address using handleID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.796 [INFO][4295] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.796 [INFO][4295] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.813 [WARNING][4295] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.813 [INFO][4295] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.814 [INFO][4295] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:29.818296 env[1354]: 2024-02-09 09:57:29.817 [INFO][4286] k8s.go 591: Teardown processing complete. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.818755 env[1354]: time="2024-02-09T09:57:29.818346491Z" level=info msg="TearDown network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" successfully" Feb 9 09:57:29.818755 env[1354]: time="2024-02-09T09:57:29.818378052Z" level=info msg="StopPodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" returns successfully" Feb 9 09:57:29.818997 env[1354]: time="2024-02-09T09:57:29.818962665Z" level=info msg="RemovePodSandbox for \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" Feb 9 09:57:29.819045 env[1354]: time="2024-02-09T09:57:29.819004666Z" level=info msg="Forcibly stopping sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\"" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.860 [WARNING][4313] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ad2fe95e-e733-40d2-9159-940d3d488021", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"ebaa1851168dd64307aa644a53efc1bec8d8b7f4034eac799eec5b98ec9c8c7d", Pod:"coredns-5dd5756b68-z6xr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief7df1d2e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.860 [INFO][4313] k8s.go 578: Cleaning up netns ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.860 [INFO][4313] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" iface="eth0" netns="" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.860 [INFO][4313] k8s.go 585: Releasing IP address(es) ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.860 [INFO][4313] utils.go 188: Calico CNI releasing IP address ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.877 [INFO][4319] ipam_plugin.go 415: Releasing address using handleID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.877 [INFO][4319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.877 [INFO][4319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.886 [WARNING][4319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.886 [INFO][4319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" HandleID="k8s-pod-network.a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--z6xr8-eth0" Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.888 [INFO][4319] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:29.890364 env[1354]: 2024-02-09 09:57:29.889 [INFO][4313] k8s.go 591: Teardown processing complete. ContainerID="a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab" Feb 9 09:57:29.890922 env[1354]: time="2024-02-09T09:57:29.890887410Z" level=info msg="TearDown network for sandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" successfully" Feb 9 09:57:29.900269 env[1354]: time="2024-02-09T09:57:29.900226771Z" level=info msg="RemovePodSandbox \"a463d184469262d4a45aa17598ced53cc317c040cfa03de7128849c6b25e9cab\" returns successfully" Feb 9 09:57:29.900979 env[1354]: time="2024-02-09T09:57:29.900956986Z" level=info msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.944 [WARNING][4337] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0", GenerateName:"calico-kube-controllers-b46bf9566-", Namespace:"calico-system", SelfLink:"", UID:"63e62d1c-7013-46ac-8386-69127cbc8a8b", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b46bf9566", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e", Pod:"calico-kube-controllers-b46bf9566-x7cs5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic09ea207d7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.944 [INFO][4337] k8s.go 578: Cleaning up netns ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.944 [INFO][4337] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" iface="eth0" netns="" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.945 [INFO][4337] k8s.go 585: Releasing IP address(es) ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.945 [INFO][4337] utils.go 188: Calico CNI releasing IP address ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.983 [INFO][4343] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.984 [INFO][4343] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.984 [INFO][4343] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.995 [WARNING][4343] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.995 [INFO][4343] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.996 [INFO][4343] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:29.998766 env[1354]: 2024-02-09 09:57:29.997 [INFO][4337] k8s.go 591: Teardown processing complete. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:29.999288 env[1354]: time="2024-02-09T09:57:29.999254218Z" level=info msg="TearDown network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" successfully" Feb 9 09:57:29.999378 env[1354]: time="2024-02-09T09:57:29.999360660Z" level=info msg="StopPodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" returns successfully" Feb 9 09:57:29.999852 env[1354]: time="2024-02-09T09:57:29.999829270Z" level=info msg="RemovePodSandbox for \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" Feb 9 09:57:30.000081 env[1354]: time="2024-02-09T09:57:30.000042875Z" level=info msg="Forcibly stopping sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\"" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.033 [WARNING][4361] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0", GenerateName:"calico-kube-controllers-b46bf9566-", Namespace:"calico-system", SelfLink:"", UID:"63e62d1c-7013-46ac-8386-69127cbc8a8b", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b46bf9566", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"0faeeb73475d35e2c1c26c0fa8fdecd4386967853673f767f2b8d626046ffe2e", Pod:"calico-kube-controllers-b46bf9566-x7cs5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic09ea207d7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.033 [INFO][4361] k8s.go 578: Cleaning up netns ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.033 [INFO][4361] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" iface="eth0" netns="" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.033 [INFO][4361] k8s.go 585: Releasing IP address(es) ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.033 [INFO][4361] utils.go 188: Calico CNI releasing IP address ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.050 [INFO][4368] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.050 [INFO][4368] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.050 [INFO][4368] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.059 [WARNING][4368] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.059 [INFO][4368] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" HandleID="k8s-pod-network.9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--kube--controllers--b46bf9566--x7cs5-eth0" Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.061 [INFO][4368] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:30.063282 env[1354]: 2024-02-09 09:57:30.062 [INFO][4361] k8s.go 591: Teardown processing complete. ContainerID="9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97" Feb 9 09:57:30.063825 env[1354]: time="2024-02-09T09:57:30.063789594Z" level=info msg="TearDown network for sandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" successfully" Feb 9 09:57:30.072422 env[1354]: time="2024-02-09T09:57:30.072382257Z" level=info msg="RemovePodSandbox \"9e18c8ec37b6952341a67f12064e027a8b6d8c0a0ff7bad7af04a339acd8dc97\" returns successfully" Feb 9 09:57:30.073018 env[1354]: time="2024-02-09T09:57:30.072994431Z" level=info msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.108 [WARNING][4386] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c306363-d8b2-4748-ba56-4ceeadd41ddf", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10", Pod:"csi-node-driver-dplm2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7288a312b2e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.108 [INFO][4386] k8s.go 578: Cleaning up netns ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.108 [INFO][4386] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" iface="eth0" netns="" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.108 [INFO][4386] k8s.go 585: Releasing IP address(es) ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.108 [INFO][4386] utils.go 188: Calico CNI releasing IP address ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.131 [INFO][4392] ipam_plugin.go 415: Releasing address using handleID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.131 [INFO][4392] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.131 [INFO][4392] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.140 [WARNING][4392] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.141 [INFO][4392] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.142 [INFO][4392] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:30.144394 env[1354]: 2024-02-09 09:57:30.143 [INFO][4386] k8s.go 591: Teardown processing complete. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.144999 env[1354]: time="2024-02-09T09:57:30.144946925Z" level=info msg="TearDown network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" successfully" Feb 9 09:57:30.145102 env[1354]: time="2024-02-09T09:57:30.145079808Z" level=info msg="StopPodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" returns successfully" Feb 9 09:57:30.145749 env[1354]: time="2024-02-09T09:57:30.145725181Z" level=info msg="RemovePodSandbox for \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" Feb 9 09:57:30.145910 env[1354]: time="2024-02-09T09:57:30.145856584Z" level=info msg="Forcibly stopping sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\"" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.184 [WARNING][4412] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c306363-d8b2-4748-ba56-4ceeadd41ddf", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"e0fc86971abb5d9479f852f2b4fac9fd61bb1cb818ce36843f5c6e244898cf10", Pod:"csi-node-driver-dplm2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7288a312b2e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.184 [INFO][4412] k8s.go 578: Cleaning up netns ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.184 [INFO][4412] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" iface="eth0" netns="" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.184 [INFO][4412] k8s.go 585: Releasing IP address(es) ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.184 [INFO][4412] utils.go 188: Calico CNI releasing IP address ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.201 [INFO][4418] ipam_plugin.go 415: Releasing address using handleID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.201 [INFO][4418] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.201 [INFO][4418] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.210 [WARNING][4418] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.211 [INFO][4418] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" HandleID="k8s-pod-network.b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Workload="ci--3510.3.2--a--08b227d6a8-k8s-csi--node--driver--dplm2-eth0" Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.212 [INFO][4418] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:30.214637 env[1354]: 2024-02-09 09:57:30.213 [INFO][4412] k8s.go 591: Teardown processing complete. ContainerID="b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e" Feb 9 09:57:30.215241 env[1354]: time="2024-02-09T09:57:30.215207863Z" level=info msg="TearDown network for sandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" successfully" Feb 9 09:57:30.222498 env[1354]: time="2024-02-09T09:57:30.222458258Z" level=info msg="RemovePodSandbox \"b8a7002880e35062d1cfd7500ccd48ec79bcf5a3508fe42ef2f64af1d174616e\" returns successfully" Feb 9 09:57:30.223111 env[1354]: time="2024-02-09T09:57:30.223077551Z" level=info msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.255 [WARNING][4436] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b7875f62-26d8-4cbc-b848-01725b8d995a", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c", Pod:"coredns-5dd5756b68-rs9xj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid5ede9d6acc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.255 [INFO][4436] k8s.go 578: Cleaning up netns ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.255 [INFO][4436] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" iface="eth0" netns="" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.255 [INFO][4436] k8s.go 585: Releasing IP address(es) ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.255 [INFO][4436] utils.go 188: Calico CNI releasing IP address ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.272 [INFO][4442] ipam_plugin.go 415: Releasing address using handleID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.272 [INFO][4442] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.272 [INFO][4442] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.281 [WARNING][4442] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.281 [INFO][4442] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.282 [INFO][4442] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:30.286295 env[1354]: 2024-02-09 09:57:30.283 [INFO][4436] k8s.go 591: Teardown processing complete. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.286295 env[1354]: time="2024-02-09T09:57:30.284867348Z" level=info msg="TearDown network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" successfully" Feb 9 09:57:30.286295 env[1354]: time="2024-02-09T09:57:30.284897949Z" level=info msg="StopPodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" returns successfully" Feb 9 09:57:30.286786 env[1354]: time="2024-02-09T09:57:30.286441302Z" level=info msg="RemovePodSandbox for \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" Feb 9 09:57:30.286786 env[1354]: time="2024-02-09T09:57:30.286477183Z" level=info msg="Forcibly stopping sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\"" Feb 9 09:57:30.296000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.302524 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 9 09:57:30.302635 kernel: audit: type=1400 audit(1707472650.296:1325): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.296000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f43de0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.362747 kernel: audit: type=1300 audit(1707472650.296:1325): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f43de0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.364139 kernel: audit: type=1327 audit(1707472650.296:1325): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.296000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.418845 kernel: audit: type=1400 audit(1707472650.303:1326): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c584c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.453675 kernel: audit: type=1300 audit(1707472650.303:1326): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c584c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.488381 kernel: audit: type=1327 audit(1707472650.303:1326): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.515092 kernel: audit: type=1400 audit(1707472650.303:1327): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c584e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.550657 kernel: audit: type=1300 audit(1707472650.303:1327): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c584e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.580445 kernel: audit: type=1327 audit(1707472650.303:1327): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.607101 kernel: audit: type=1400 audit(1707472650.303:1328): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:57:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c58500 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:57:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.516 [WARNING][4460] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b7875f62-26d8-4cbc-b848-01725b8d995a", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 56, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"24cd6f7e2f27724593d35a21e999aefce2c0eae735d0542b37bb69ee2744049c", Pod:"coredns-5dd5756b68-rs9xj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid5ede9d6acc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.517 [INFO][4460] k8s.go 578: Cleaning up netns ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.517 [INFO][4460] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" iface="eth0" netns="" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.517 [INFO][4460] k8s.go 585: Releasing IP address(es) ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.517 [INFO][4460] utils.go 188: Calico CNI releasing IP address ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.541 [INFO][4468] ipam_plugin.go 415: Releasing address using handleID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.541 [INFO][4468] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.541 [INFO][4468] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.609 [WARNING][4468] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.609 [INFO][4468] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" HandleID="k8s-pod-network.2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Workload="ci--3510.3.2--a--08b227d6a8-k8s-coredns--5dd5756b68--rs9xj-eth0" Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.610 [INFO][4468] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:30.612861 env[1354]: 2024-02-09 09:57:30.611 [INFO][4460] k8s.go 591: Teardown processing complete. ContainerID="2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7" Feb 9 09:57:30.613379 env[1354]: time="2024-02-09T09:57:30.612891943Z" level=info msg="TearDown network for sandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" successfully" Feb 9 09:57:30.621754 env[1354]: time="2024-02-09T09:57:30.621705891Z" level=info msg="RemovePodSandbox \"2be22c61b3dd57909fb5b990cd399271d1f99f8a0ab86f935279f248e905f8f7\" returns successfully" Feb 9 09:57:32.637242 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.SWA9fz.mount: Deactivated successfully. Feb 9 09:57:34.361797 kubelet[2478]: I0209 09:57:34.361764 2478 topology_manager.go:215] "Topology Admit Handler" podUID="c49d012b-4527-4a9e-b3c2-c37a417873df" podNamespace="calico-apiserver" podName="calico-apiserver-57d9f5875f-7jscd" Feb 9 09:57:34.367614 systemd[1]: Created slice kubepods-besteffort-podc49d012b_4527_4a9e_b3c2_c37a417873df.slice. Feb 9 09:57:34.403141 kubelet[2478]: I0209 09:57:34.403110 2478 topology_manager.go:215] "Topology Admit Handler" podUID="15034600-bbf1-4dcc-8c63-247b957ab283" podNamespace="calico-apiserver" podName="calico-apiserver-57d9f5875f-5v6mv" Feb 9 09:57:34.408238 systemd[1]: Created slice kubepods-besteffort-pod15034600_bbf1_4dcc_8c63_247b957ab283.slice. Feb 9 09:57:34.499000 audit[4497]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:34.499000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff1315760 a2=0 a3=ffffaba956c0 items=0 ppid=2654 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:34.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:34.503519 kubelet[2478]: I0209 09:57:34.503484 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcfhr\" (UniqueName: \"kubernetes.io/projected/c49d012b-4527-4a9e-b3c2-c37a417873df-kube-api-access-qcfhr\") pod \"calico-apiserver-57d9f5875f-7jscd\" (UID: \"c49d012b-4527-4a9e-b3c2-c37a417873df\") " pod="calico-apiserver/calico-apiserver-57d9f5875f-7jscd" Feb 9 09:57:34.503664 kubelet[2478]: I0209 09:57:34.503533 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c49d012b-4527-4a9e-b3c2-c37a417873df-calico-apiserver-certs\") pod \"calico-apiserver-57d9f5875f-7jscd\" (UID: \"c49d012b-4527-4a9e-b3c2-c37a417873df\") " pod="calico-apiserver/calico-apiserver-57d9f5875f-7jscd" Feb 9 09:57:34.503664 kubelet[2478]: I0209 09:57:34.503556 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lbjtf\" (UniqueName: \"kubernetes.io/projected/15034600-bbf1-4dcc-8c63-247b957ab283-kube-api-access-lbjtf\") pod \"calico-apiserver-57d9f5875f-5v6mv\" (UID: \"15034600-bbf1-4dcc-8c63-247b957ab283\") " pod="calico-apiserver/calico-apiserver-57d9f5875f-5v6mv" Feb 9 09:57:34.503664 kubelet[2478]: I0209 09:57:34.503576 2478 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/15034600-bbf1-4dcc-8c63-247b957ab283-calico-apiserver-certs\") pod \"calico-apiserver-57d9f5875f-5v6mv\" (UID: \"15034600-bbf1-4dcc-8c63-247b957ab283\") " pod="calico-apiserver/calico-apiserver-57d9f5875f-5v6mv" Feb 9 09:57:34.500000 audit[4497]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:34.500000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff1315760 a2=0 a3=ffffaba956c0 items=0 ppid=2654 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:34.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:34.511000 audit[4504]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:34.511000 audit[4504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff68a71a0 a2=0 a3=ffffb4dc16c0 items=0 ppid=2654 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:34.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:34.512000 audit[4504]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:34.512000 audit[4504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff68a71a0 a2=0 a3=ffffb4dc16c0 items=0 ppid=2654 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:34.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:34.604873 kubelet[2478]: E0209 09:57:34.604845 2478 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:57:34.605178 kubelet[2478]: E0209 09:57:34.605163 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/15034600-bbf1-4dcc-8c63-247b957ab283-calico-apiserver-certs podName:15034600-bbf1-4dcc-8c63-247b957ab283 nodeName:}" failed. No retries permitted until 2024-02-09 09:57:35.105142478 +0000 UTC m=+65.491940814 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/15034600-bbf1-4dcc-8c63-247b957ab283-calico-apiserver-certs") pod "calico-apiserver-57d9f5875f-5v6mv" (UID: "15034600-bbf1-4dcc-8c63-247b957ab283") : secret "calico-apiserver-certs" not found Feb 9 09:57:34.605427 kubelet[2478]: E0209 09:57:34.605400 2478 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:57:34.605505 kubelet[2478]: E0209 09:57:34.605449 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c49d012b-4527-4a9e-b3c2-c37a417873df-calico-apiserver-certs podName:c49d012b-4527-4a9e-b3c2-c37a417873df nodeName:}" failed. No retries permitted until 2024-02-09 09:57:35.105438085 +0000 UTC m=+65.492236461 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c49d012b-4527-4a9e-b3c2-c37a417873df-calico-apiserver-certs") pod "calico-apiserver-57d9f5875f-7jscd" (UID: "c49d012b-4527-4a9e-b3c2-c37a417873df") : secret "calico-apiserver-certs" not found Feb 9 09:57:35.272476 env[1354]: time="2024-02-09T09:57:35.272101147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57d9f5875f-7jscd,Uid:c49d012b-4527-4a9e-b3c2-c37a417873df,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:57:35.311363 env[1354]: time="2024-02-09T09:57:35.311292435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57d9f5875f-5v6mv,Uid:15034600-bbf1-4dcc-8c63-247b957ab283,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:57:35.417943 systemd-networkd[1501]: cali1406048599c: Link UP Feb 9 09:57:35.432110 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:35.432246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1406048599c: link becomes ready Feb 9 09:57:35.437057 systemd-networkd[1501]: cali1406048599c: Gained carrier Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.336 [INFO][4509] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0 calico-apiserver-57d9f5875f- calico-apiserver c49d012b-4527-4a9e-b3c2-c37a417873df 813 0 2024-02-09 09:57:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57d9f5875f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 calico-apiserver-57d9f5875f-7jscd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1406048599c [] []}} ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.337 [INFO][4509] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.370 [INFO][4527] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" HandleID="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.386 [INFO][4527] ipam_plugin.go 268: Auto assigning IP ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" HandleID="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd730), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"calico-apiserver-57d9f5875f-7jscd", "timestamp":"2024-02-09 09:57:35.370545495 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.386 [INFO][4527] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.386 [INFO][4527] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.386 [INFO][4527] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.388 [INFO][4527] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.395 [INFO][4527] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.399 [INFO][4527] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.401 [INFO][4527] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.403 [INFO][4527] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.403 [INFO][4527] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.405 [INFO][4527] ipam.go 1682: Creating new handle: k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.408 [INFO][4527] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.412 [INFO][4527] ipam.go 1216: Successfully claimed IPs: [192.168.123.69/26] block=192.168.123.64/26 handle="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.413 [INFO][4527] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.69/26] handle="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.413 [INFO][4527] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:35.457152 env[1354]: 2024-02-09 09:57:35.413 [INFO][4527] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.69/26] IPv6=[] ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" HandleID="k8s-pod-network.34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.415 [INFO][4509] k8s.go 385: Populated endpoint ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0", GenerateName:"calico-apiserver-57d9f5875f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c49d012b-4527-4a9e-b3c2-c37a417873df", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57d9f5875f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"calico-apiserver-57d9f5875f-7jscd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1406048599c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.415 [INFO][4509] k8s.go 386: Calico CNI using IPs: [192.168.123.69/32] ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.416 [INFO][4509] dataplane_linux.go 68: Setting the host side veth name to cali1406048599c ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.438 [INFO][4509] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.438 [INFO][4509] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0", GenerateName:"calico-apiserver-57d9f5875f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c49d012b-4527-4a9e-b3c2-c37a417873df", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57d9f5875f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b", Pod:"calico-apiserver-57d9f5875f-7jscd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1406048599c", MAC:"2e:43:dc:19:d2:0c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:35.459079 env[1354]: 2024-02-09 09:57:35.446 [INFO][4509] k8s.go 491: Wrote updated endpoint to datastore ContainerID="34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-7jscd" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--7jscd-eth0" Feb 9 09:57:35.481386 env[1354]: time="2024-02-09T09:57:35.481135252Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:35.481386 env[1354]: time="2024-02-09T09:57:35.481170573Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:35.481386 env[1354]: time="2024-02-09T09:57:35.481180933Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:35.482447 env[1354]: time="2024-02-09T09:57:35.482399838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b pid=4573 runtime=io.containerd.runc.v2 Feb 9 09:57:35.498000 audit[4586]: NETFILTER_CFG table=filter:116 family=2 entries=59 op=nft_register_chain pid=4586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:35.504478 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 09:57:35.504589 kernel: audit: type=1325 audit(1707472655.498:1333): table=filter:116 family=2 entries=59 op=nft_register_chain pid=4586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:35.498000 audit[4586]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffffdeb190 a2=0 a3=ffff83924fa8 items=0 ppid=3433 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.553422 kernel: audit: type=1300 audit(1707472655.498:1333): arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffffdeb190 a2=0 a3=ffff83924fa8 items=0 ppid=3433 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.498000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:35.573268 kernel: audit: type=1327 audit(1707472655.498:1333): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:35.574744 systemd[1]: Started cri-containerd-34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b.scope. Feb 9 09:57:35.584325 systemd-networkd[1501]: cali8baec34cbb5: Link UP Feb 9 09:57:35.593994 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8baec34cbb5: link becomes ready Feb 9 09:57:35.593466 systemd-networkd[1501]: cali8baec34cbb5: Gained carrier Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.646848 kernel: audit: type=1400 audit(1707472655.598:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.646973 kernel: audit: type=1400 audit(1707472655.598:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.670167 kernel: audit: type=1400 audit(1707472655.598:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.696340 kernel: audit: type=1400 audit(1707472655.598:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.719441 kernel: audit: type=1400 audit(1707472655.598:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.386 [INFO][4522] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0 calico-apiserver-57d9f5875f- calico-apiserver 15034600-bbf1-4dcc-8c63-247b957ab283 816 0 2024-02-09 09:57:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57d9f5875f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-08b227d6a8 calico-apiserver-57d9f5875f-5v6mv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8baec34cbb5 [] []}} ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.386 [INFO][4522] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.448 [INFO][4539] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" HandleID="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.478 [INFO][4539] ipam_plugin.go 268: Auto assigning IP ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" HandleID="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b38d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-08b227d6a8", "pod":"calico-apiserver-57d9f5875f-5v6mv", "timestamp":"2024-02-09 09:57:35.448939429 +0000 UTC"}, Hostname:"ci-3510.3.2-a-08b227d6a8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.479 [INFO][4539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.479 [INFO][4539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.479 [INFO][4539] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-08b227d6a8' Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.481 [INFO][4539] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.484 [INFO][4539] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.489 [INFO][4539] ipam.go 489: Trying affinity for 192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.493 [INFO][4539] ipam.go 155: Attempting to load block cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.497 [INFO][4539] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.64/26 host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.497 [INFO][4539] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.64/26 handle="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.520 [INFO][4539] ipam.go 1682: Creating new handle: k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.553 [INFO][4539] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.64/26 handle="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.576 [INFO][4539] ipam.go 1216: Successfully claimed IPs: [192.168.123.70/26] block=192.168.123.64/26 handle="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.576 [INFO][4539] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.70/26] handle="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" host="ci-3510.3.2-a-08b227d6a8" Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.576 [INFO][4539] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:57:35.721605 env[1354]: 2024-02-09 09:57:35.576 [INFO][4539] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.123.70/26] IPv6=[] ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" HandleID="k8s-pod-network.1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Workload="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.582 [INFO][4522] k8s.go 385: Populated endpoint ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0", GenerateName:"calico-apiserver-57d9f5875f-", Namespace:"calico-apiserver", SelfLink:"", UID:"15034600-bbf1-4dcc-8c63-247b957ab283", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57d9f5875f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"", Pod:"calico-apiserver-57d9f5875f-5v6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8baec34cbb5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.582 [INFO][4522] k8s.go 386: Calico CNI using IPs: [192.168.123.70/32] ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.582 [INFO][4522] dataplane_linux.go 68: Setting the host side veth name to cali8baec34cbb5 ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.599 [INFO][4522] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.628 [INFO][4522] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0", GenerateName:"calico-apiserver-57d9f5875f-", Namespace:"calico-apiserver", SelfLink:"", UID:"15034600-bbf1-4dcc-8c63-247b957ab283", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 57, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57d9f5875f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-08b227d6a8", ContainerID:"1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb", Pod:"calico-apiserver-57d9f5875f-5v6mv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8baec34cbb5", MAC:"02:8c:bd:c3:9d:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:57:35.722280 env[1354]: 2024-02-09 09:57:35.704 [INFO][4522] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb" Namespace="calico-apiserver" Pod="calico-apiserver-57d9f5875f-5v6mv" WorkloadEndpoint="ci--3510.3.2--a--08b227d6a8-k8s-calico--apiserver--57d9f5875f--5v6mv-eth0" Feb 9 09:57:35.740471 kernel: audit: type=1400 audit(1707472655.598:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.760961 kernel: audit: type=1400 audit(1707472655.598:1340): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.599000 audit: BPF prog-id=183 op=LOAD Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4573 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334653132323531643337333037316339353464316635623138303136 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4573 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334653132323531643337333037316339353464316635623138303136 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.600000 audit: BPF prog-id=184 op=LOAD Feb 9 09:57:35.600000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4573 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334653132323531643337333037316339353464316635623138303136 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit: BPF prog-id=185 op=LOAD Feb 9 09:57:35.619000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4573 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334653132323531643337333037316339353464316635623138303136 Feb 9 09:57:35.619000 audit: BPF prog-id=185 op=UNLOAD Feb 9 09:57:35.619000 audit: BPF prog-id=184 op=UNLOAD Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.619000 audit: BPF prog-id=186 op=LOAD Feb 9 09:57:35.619000 audit[4581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4573 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334653132323531643337333037316339353464316635623138303136 Feb 9 09:57:35.699000 audit[4602]: NETFILTER_CFG table=filter:117 family=2 entries=50 op=nft_register_chain pid=4602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:57:35.699000 audit[4602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffdbe77350 a2=0 a3=ffffa2f9efa8 items=0 ppid=3433 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:57:35.770299 env[1354]: time="2024-02-09T09:57:35.770258286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57d9f5875f-7jscd,Uid:c49d012b-4527-4a9e-b3c2-c37a417873df,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b\"" Feb 9 09:57:35.773837 env[1354]: time="2024-02-09T09:57:35.773808279Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:57:35.778430 env[1354]: time="2024-02-09T09:57:35.778112088Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:57:35.778430 env[1354]: time="2024-02-09T09:57:35.778147689Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:57:35.778430 env[1354]: time="2024-02-09T09:57:35.778169209Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:57:35.778430 env[1354]: time="2024-02-09T09:57:35.778297812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb pid=4628 runtime=io.containerd.runc.v2 Feb 9 09:57:35.799418 systemd[1]: run-containerd-runc-k8s.io-1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb-runc.pPdp0J.mount: Deactivated successfully. Feb 9 09:57:35.803592 systemd[1]: Started cri-containerd-1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb.scope. Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.817000 audit: BPF prog-id=187 op=LOAD Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161306631626439343034636139653332333261373137393863323763 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161306631626439343034636139653332333261373137393863323763 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit: BPF prog-id=188 op=LOAD Feb 9 09:57:35.818000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161306631626439343034636139653332333261373137393863323763 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit: BPF prog-id=189 op=LOAD Feb 9 09:57:35.818000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161306631626439343034636139653332333261373137393863323763 Feb 9 09:57:35.818000 audit: BPF prog-id=189 op=UNLOAD Feb 9 09:57:35.818000 audit: BPF prog-id=188 op=UNLOAD Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:35.818000 audit: BPF prog-id=190 op=LOAD Feb 9 09:57:35.818000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:35.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161306631626439343034636139653332333261373137393863323763 Feb 9 09:57:35.838405 env[1354]: time="2024-02-09T09:57:35.838327248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57d9f5875f-5v6mv,Uid:15034600-bbf1-4dcc-8c63-247b957ab283,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb\"" Feb 9 09:57:36.653498 systemd-networkd[1501]: cali8baec34cbb5: Gained IPv6LL Feb 9 09:57:37.413504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1341051774.mount: Deactivated successfully. Feb 9 09:57:37.420449 systemd-networkd[1501]: cali1406048599c: Gained IPv6LL Feb 9 09:57:39.525506 env[1354]: time="2024-02-09T09:57:39.525395093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:39.530682 env[1354]: time="2024-02-09T09:57:39.530642758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:39.534200 env[1354]: time="2024-02-09T09:57:39.534167829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:39.537112 env[1354]: time="2024-02-09T09:57:39.537018046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:39.537788 env[1354]: time="2024-02-09T09:57:39.537757861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 09:57:39.538735 env[1354]: time="2024-02-09T09:57:39.538696400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:57:39.542113 env[1354]: time="2024-02-09T09:57:39.542079748Z" level=info msg="CreateContainer within sandbox \"34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:57:39.573159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1743673892.mount: Deactivated successfully. Feb 9 09:57:39.584136 env[1354]: time="2024-02-09T09:57:39.584090512Z" level=info msg="CreateContainer within sandbox \"34e12251d373071c954d1f5b18016f3f50e6ce8c6879bda00c2264e84aa3c50b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e\"" Feb 9 09:57:39.585016 env[1354]: time="2024-02-09T09:57:39.584987850Z" level=info msg="StartContainer for \"efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e\"" Feb 9 09:57:39.604699 systemd[1]: Started cri-containerd-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e.scope. Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.625000 audit: BPF prog-id=191 op=LOAD Feb 9 09:57:39.626000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.626000 audit[4669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4573 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:39.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643731636562396430336430633734376535663330363133623865 Feb 9 09:57:39.626000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.626000 audit[4669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4573 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:39.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643731636562396430336430633734376535663330363133623865 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit: BPF prog-id=192 op=LOAD Feb 9 09:57:39.627000 audit[4669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4573 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643731636562396430336430633734376535663330363133623865 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.627000 audit: BPF prog-id=193 op=LOAD Feb 9 09:57:39.627000 audit[4669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4573 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643731636562396430336430633734376535663330363133623865 Feb 9 09:57:39.628000 audit: BPF prog-id=193 op=UNLOAD Feb 9 09:57:39.628000 audit: BPF prog-id=192 op=UNLOAD Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { perfmon } for pid=4669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit[4669]: AVC avc: denied { bpf } for pid=4669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:39.628000 audit: BPF prog-id=194 op=LOAD Feb 9 09:57:39.628000 audit[4669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4573 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:39.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643731636562396430336430633734376535663330363133623865 Feb 9 09:57:39.659120 env[1354]: time="2024-02-09T09:57:39.659067418Z" level=info msg="StartContainer for \"efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e\" returns successfully" Feb 9 09:57:39.994758 env[1354]: time="2024-02-09T09:57:39.994726120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:40.001160 env[1354]: time="2024-02-09T09:57:40.001131969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:40.007860 env[1354]: time="2024-02-09T09:57:40.007830743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:40.017758 env[1354]: time="2024-02-09T09:57:40.017727300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:57:40.018007 env[1354]: time="2024-02-09T09:57:40.017933224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 09:57:40.022239 env[1354]: time="2024-02-09T09:57:40.022209030Z" level=info msg="CreateContainer within sandbox \"1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:57:40.026000 audit[4699]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:40.026000 audit[4699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffccc47f90 a2=0 a3=ffffb57d26c0 items=0 ppid=2654 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:40.027000 audit[4699]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:40.027000 audit[4699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffccc47f90 a2=0 a3=ffffb57d26c0 items=0 ppid=2654 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:40.050935 env[1354]: time="2024-02-09T09:57:40.050889523Z" level=info msg="CreateContainer within sandbox \"1a0f1bd9404ca9e3232a71798c27cc978c813c506aa5b5795cc09903371289cb\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c\"" Feb 9 09:57:40.051662 env[1354]: time="2024-02-09T09:57:40.051641898Z" level=info msg="StartContainer for \"4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c\"" Feb 9 09:57:40.074277 systemd[1]: Started cri-containerd-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c.scope. Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.086000 audit: BPF prog-id=195 op=LOAD Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4628 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343830323535363965386131653731333631643863363639633537 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4628 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343830323535363965386131653731333631643863363639633537 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.087000 audit: BPF prog-id=196 op=LOAD Feb 9 09:57:40.087000 audit[4708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4628 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343830323535363965386131653731333631643863363639633537 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit: BPF prog-id=197 op=LOAD Feb 9 09:57:40.088000 audit[4708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4628 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343830323535363965386131653731333631643863363639633537 Feb 9 09:57:40.088000 audit: BPF prog-id=197 op=UNLOAD Feb 9 09:57:40.088000 audit: BPF prog-id=196 op=UNLOAD Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { perfmon } for pid=4708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit[4708]: AVC avc: denied { bpf } for pid=4708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:40.088000 audit: BPF prog-id=198 op=LOAD Feb 9 09:57:40.088000 audit[4708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4628 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:40.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343830323535363965386131653731333631643863363639633537 Feb 9 09:57:40.116349 env[1354]: time="2024-02-09T09:57:40.116295189Z" level=info msg="StartContainer for \"4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c\" returns successfully" Feb 9 09:57:40.752000 audit[4680]: AVC avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:57:40.758556 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 09:57:40.758684 kernel: audit: type=1400 audit(1707472660.752:1409): avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:57:40.752000 audit[4680]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ddaec0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:57:40.821789 kernel: audit: type=1300 audit(1707472660.752:1409): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ddaec0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:57:40.752000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:40.850455 kernel: audit: type=1327 audit(1707472660.752:1409): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:40.948000 audit[4720]: AVC avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:57:40.948000 audit[4720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d50ba0 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:57:41.010896 kernel: audit: type=1400 audit(1707472660.948:1410): avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:57:41.011030 kernel: audit: type=1300 audit(1707472660.948:1410): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d50ba0 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:57:40.948000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:41.040273 kernel: audit: type=1327 audit(1707472660.948:1410): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:57:41.053302 kubelet[2478]: I0209 09:57:41.052974 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57d9f5875f-7jscd" podStartSLOduration=3.286459934 podCreationTimestamp="2024-02-09 09:57:34 +0000 UTC" firstStartedPulling="2024-02-09 09:57:35.771665235 +0000 UTC m=+66.158463571" lastFinishedPulling="2024-02-09 09:57:39.538133549 +0000 UTC m=+69.924932045" observedRunningTime="2024-02-09 09:57:39.975453733 +0000 UTC m=+70.362252109" watchObservedRunningTime="2024-02-09 09:57:41.052928408 +0000 UTC m=+71.439726784" Feb 9 09:57:41.068000 audit[4743]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:41.068000 audit[4743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd9ac3a80 a2=0 a3=ffff8bf496c0 items=0 ppid=2654 pid=4743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:41.118678 kernel: audit: type=1325 audit(1707472661.068:1411): table=filter:120 family=2 entries=10 op=nft_register_rule pid=4743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:41.118811 kernel: audit: type=1300 audit(1707472661.068:1411): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd9ac3a80 a2=0 a3=ffff8bf496c0 items=0 ppid=2654 pid=4743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:41.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:41.135631 kernel: audit: type=1327 audit(1707472661.068:1411): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:41.071000 audit[4743]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:41.152447 kernel: audit: type=1325 audit(1707472661.071:1412): table=nat:121 family=2 entries=20 op=nft_register_rule pid=4743 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:57:41.071000 audit[4743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd9ac3a80 a2=0 a3=ffff8bf496c0 items=0 ppid=2654 pid=4743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:41.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:57:58.400580 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.tDVe5p.mount: Deactivated successfully. Feb 9 09:58:00.152346 update_engine[1342]: I0209 09:58:00.152169 1342 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 09:58:00.152346 update_engine[1342]: I0209 09:58:00.152205 1342 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 09:58:00.152950 update_engine[1342]: I0209 09:58:00.152935 1342 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 09:58:00.153591 update_engine[1342]: I0209 09:58:00.153570 1342 omaha_request_params.cc:62] Current group set to lts Feb 9 09:58:00.153684 update_engine[1342]: I0209 09:58:00.153668 1342 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 09:58:00.153684 update_engine[1342]: I0209 09:58:00.153678 1342 update_attempter.cc:643] Scheduling an action processor start. Feb 9 09:58:00.153737 update_engine[1342]: I0209 09:58:00.153693 1342 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 09:58:00.153737 update_engine[1342]: I0209 09:58:00.153715 1342 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 09:58:00.155077 locksmithd[1431]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 09:58:00.177378 update_engine[1342]: I0209 09:58:00.177336 1342 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 09:58:00.177378 update_engine[1342]: I0209 09:58:00.177368 1342 omaha_request_action.cc:271] Request: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: Feb 9 09:58:00.177378 update_engine[1342]: I0209 09:58:00.177374 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 09:58:00.178193 update_engine[1342]: I0209 09:58:00.178172 1342 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 09:58:00.178834 update_engine[1342]: I0209 09:58:00.178817 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 09:58:00.446274 update_engine[1342]: E0209 09:58:00.446156 1342 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 09:58:00.447029 update_engine[1342]: I0209 09:58:00.447001 1342 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 09:58:02.480489 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.jSuZug.mount: Deactivated successfully. Feb 9 09:58:03.472338 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.CgzKjG.mount: Deactivated successfully. Feb 9 09:58:05.288012 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.pJ6avP.mount: Deactivated successfully. Feb 9 09:58:05.340906 kubelet[2478]: I0209 09:58:05.337026 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57d9f5875f-5v6mv" podStartSLOduration=27.158279544 podCreationTimestamp="2024-02-09 09:57:34 +0000 UTC" firstStartedPulling="2024-02-09 09:57:35.839515112 +0000 UTC m=+66.226313488" lastFinishedPulling="2024-02-09 09:57:40.01822675 +0000 UTC m=+70.405025126" observedRunningTime="2024-02-09 09:57:41.05352982 +0000 UTC m=+71.440328196" watchObservedRunningTime="2024-02-09 09:58:05.336991182 +0000 UTC m=+95.723789558" Feb 9 09:58:05.347461 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.3iWITt.mount: Deactivated successfully. Feb 9 09:58:05.416988 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 09:58:05.417113 kernel: audit: type=1325 audit(1707472685.403:1413): table=filter:122 family=2 entries=9 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.403000 audit[4870]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.403000 audit[4870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffbf00c40 a2=0 a3=ffffa6c406c0 items=0 ppid=2654 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.460488 kernel: audit: type=1300 audit(1707472685.403:1413): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffbf00c40 a2=0 a3=ffffa6c406c0 items=0 ppid=2654 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.476447 kernel: audit: type=1327 audit(1707472685.403:1413): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.404000 audit[4870]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.493398 kernel: audit: type=1325 audit(1707472685.404:1414): table=nat:123 family=2 entries=27 op=nft_register_chain pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.404000 audit[4870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=fffffbf00c40 a2=0 a3=ffffa6c406c0 items=0 ppid=2654 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.526822 kernel: audit: type=1300 audit(1707472685.404:1414): arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=fffffbf00c40 a2=0 a3=ffffa6c406c0 items=0 ppid=2654 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.542342 kernel: audit: type=1327 audit(1707472685.404:1414): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.542459 kernel: audit: type=1325 audit(1707472685.526:1415): table=filter:124 family=2 entries=8 op=nft_register_rule pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.526000 audit[4872]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.526000 audit[4872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffefbc26e0 a2=0 a3=ffffbaaee6c0 items=0 ppid=2654 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.591337 kernel: audit: type=1300 audit(1707472685.526:1415): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffefbc26e0 a2=0 a3=ffffbaaee6c0 items=0 ppid=2654 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.607592 kernel: audit: type=1327 audit(1707472685.526:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:05.607703 kernel: audit: type=1325 audit(1707472685.526:1416): table=nat:125 family=2 entries=34 op=nft_register_chain pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.526000 audit[4872]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:05.526000 audit[4872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=ffffefbc26e0 a2=0 a3=ffffbaaee6c0 items=0 ppid=2654 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:05.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:11.143346 update_engine[1342]: I0209 09:58:11.143271 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 09:58:11.143715 update_engine[1342]: I0209 09:58:11.143467 1342 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 09:58:11.143715 update_engine[1342]: I0209 09:58:11.143651 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 09:58:11.254986 update_engine[1342]: E0209 09:58:11.254948 1342 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 09:58:11.255125 update_engine[1342]: I0209 09:58:11.255050 1342 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 09:58:21.143823 update_engine[1342]: I0209 09:58:21.143781 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 09:58:21.144153 update_engine[1342]: I0209 09:58:21.143962 1342 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 09:58:21.144153 update_engine[1342]: I0209 09:58:21.144145 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 09:58:21.198524 update_engine[1342]: E0209 09:58:21.198485 1342 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 09:58:21.198674 update_engine[1342]: I0209 09:58:21.198593 1342 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 09:58:25.735000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.741488 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 09:58:25.741599 kernel: audit: type=1400 audit(1707472705.735:1417): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.735000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002059950 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:25.801104 kernel: audit: type=1300 audit(1707472705.735:1417): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002059950 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:25.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:25.829096 kernel: audit: type=1327 audit(1707472705.735:1417): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:25.829232 kernel: audit: type=1400 audit(1707472705.735:1418): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.735000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.735000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f69b00 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:25.887117 kernel: audit: type=1300 audit(1707472705.735:1418): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f69b00 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:25.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:25.918034 kernel: audit: type=1327 audit(1707472705.735:1418): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.942981 kernel: audit: type=1400 audit(1707472705.870:1419): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.943103 kernel: audit: type=1300 audit(1707472705.870:1419): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4014089420 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4014089420 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:26.002638 kernel: audit: type=1327 audit(1707472705.870:1419): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:26.030089 kernel: audit: type=1400 audit(1707472705.870:1420): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4012c67e30 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:25.872000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.872000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4012c67ec0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:25.875000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.875000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4014089540 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.875000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:25.885000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.885000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=401404d080 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.885000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:25.886000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.886000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=401414a030 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:58:25.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:58:28.396061 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.bMcfEG.mount: Deactivated successfully. Feb 9 09:58:30.297000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:30.297000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f69e20 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:30.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f69e40 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002c71c80 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002c71ca0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:58:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:31.143248 update_engine[1342]: I0209 09:58:31.143209 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 09:58:31.143600 update_engine[1342]: I0209 09:58:31.143409 1342 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 09:58:31.143600 update_engine[1342]: I0209 09:58:31.143599 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 09:58:31.212689 update_engine[1342]: E0209 09:58:31.212651 1342 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 09:58:31.212829 update_engine[1342]: I0209 09:58:31.212757 1342 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 09:58:31.212829 update_engine[1342]: I0209 09:58:31.212764 1342 omaha_request_action.cc:621] Omaha request response: Feb 9 09:58:31.212878 update_engine[1342]: E0209 09:58:31.212841 1342 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 09:58:31.212878 update_engine[1342]: I0209 09:58:31.212853 1342 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 09:58:31.212878 update_engine[1342]: I0209 09:58:31.212857 1342 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 09:58:31.212878 update_engine[1342]: I0209 09:58:31.212858 1342 update_attempter.cc:306] Processing Done. Feb 9 09:58:31.212878 update_engine[1342]: E0209 09:58:31.212870 1342 update_attempter.cc:619] Update failed. Feb 9 09:58:31.212878 update_engine[1342]: I0209 09:58:31.212873 1342 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212880 1342 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212884 1342 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212945 1342 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212963 1342 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212966 1342 omaha_request_action.cc:271] Request: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: Feb 9 09:58:31.213014 update_engine[1342]: I0209 09:58:31.212970 1342 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 09:58:31.213336 update_engine[1342]: I0209 09:58:31.213076 1342 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 09:58:31.213336 update_engine[1342]: I0209 09:58:31.213238 1342 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 09:58:31.213564 locksmithd[1431]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 09:58:31.317622 update_engine[1342]: E0209 09:58:31.317584 1342 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317688 1342 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317694 1342 omaha_request_action.cc:621] Omaha request response: Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317700 1342 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317703 1342 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317706 1342 update_attempter.cc:306] Processing Done. Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317710 1342 update_attempter.cc:310] Error event sent. Feb 9 09:58:31.317740 update_engine[1342]: I0209 09:58:31.317718 1342 update_check_scheduler.cc:74] Next update check in 46m39s Feb 9 09:58:31.318049 locksmithd[1431]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 09:58:32.637689 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.3nXHlh.mount: Deactivated successfully. Feb 9 09:58:35.289045 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.lyVUTD.mount: Deactivated successfully. Feb 9 09:58:35.328686 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.X8OSZV.mount: Deactivated successfully. Feb 9 09:58:40.752000 audit[4680]: AVC avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:58:40.759093 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 09:58:40.759161 kernel: audit: type=1400 audit(1707472720.752:1429): avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:58:40.752000 audit[4680]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001a301e0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:58:40.819738 kernel: audit: type=1300 audit(1707472720.752:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001a301e0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:58:40.752000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:40.847112 kernel: audit: type=1327 audit(1707472720.752:1429): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:40.949000 audit[4720]: AVC avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:58:40.949000 audit[4720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ede200 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:58:41.010586 kernel: audit: type=1400 audit(1707472720.949:1430): avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:58:41.010720 kernel: audit: type=1300 audit(1707472720.949:1430): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ede200 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:58:41.010753 kernel: audit: type=1327 audit(1707472720.949:1430): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:40.949000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:58:57.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:59420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:57.295947 systemd[1]: Started sshd@7-10.200.20.4:22-10.200.12.6:59420.service. Feb 9 09:58:57.322338 kernel: audit: type=1130 audit(1707472737.294:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:59420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:57.700000 audit[4990]: USER_ACCT pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.702355 sshd[4990]: Accepted publickey for core from 10.200.12.6 port 59420 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:57.728000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.730277 sshd[4990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:57.754781 kernel: audit: type=1101 audit(1707472737.700:1432): pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.754959 kernel: audit: type=1103 audit(1707472737.728:1433): pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.770816 kernel: audit: type=1006 audit(1707472737.728:1434): pid=4990 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 09:58:57.728000 audit[4990]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9a03470 a2=3 a3=1 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:57.774243 systemd[1]: Started session-10.scope. Feb 9 09:58:57.775505 systemd-logind[1340]: New session 10 of user core. Feb 9 09:58:57.798508 kernel: audit: type=1300 audit(1707472737.728:1434): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9a03470 a2=3 a3=1 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:57.801408 kernel: audit: type=1327 audit(1707472737.728:1434): proctitle=737368643A20636F7265205B707269765D Feb 9 09:58:57.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:58:57.808331 kernel: audit: type=1105 audit(1707472737.798:1435): pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.798000 audit[4990]: USER_START pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.799000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.861065 kernel: audit: type=1103 audit(1707472737.799:1436): pid=4993 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:58.117764 sshd[4990]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:58.117000 audit[4990]: USER_END pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:58.117000 audit[4990]: CRED_DISP pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:58.150265 systemd[1]: sshd@7-10.200.20.4:22-10.200.12.6:59420.service: Deactivated successfully. Feb 9 09:58:58.151104 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 09:58:58.152456 systemd-logind[1340]: Session 10 logged out. Waiting for processes to exit. Feb 9 09:58:58.153479 systemd-logind[1340]: Removed session 10. Feb 9 09:58:58.173740 kernel: audit: type=1106 audit(1707472738.117:1437): pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:58.173835 kernel: audit: type=1104 audit(1707472738.117:1438): pid=4990 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:58.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:59420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:02.479349 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.2bZFRM.mount: Deactivated successfully. Feb 9 09:59:02.637982 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.ZzUZz1.mount: Deactivated successfully. Feb 9 09:59:03.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:03.185766 systemd[1]: Started sshd@8-10.200.20.4:22-10.200.12.6:59436.service. Feb 9 09:59:03.191666 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:03.191770 kernel: audit: type=1130 audit(1707472743.184:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:03.573000 audit[5066]: USER_ACCT pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.575509 sshd[5066]: Accepted publickey for core from 10.200.12.6 port 59436 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:03.601000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.603218 sshd[5066]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:03.627616 kernel: audit: type=1101 audit(1707472743.573:1441): pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.627717 kernel: audit: type=1103 audit(1707472743.601:1442): pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.643106 kernel: audit: type=1006 audit(1707472743.601:1443): pid=5066 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 09:59:03.601000 audit[5066]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe70d7900 a2=3 a3=1 items=0 ppid=1 pid=5066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:03.670545 kernel: audit: type=1300 audit(1707472743.601:1443): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe70d7900 a2=3 a3=1 items=0 ppid=1 pid=5066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:03.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:03.677490 systemd[1]: Started session-11.scope. Feb 9 09:59:03.678356 systemd-logind[1340]: New session 11 of user core. Feb 9 09:59:03.680460 kernel: audit: type=1327 audit(1707472743.601:1443): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:03.683000 audit[5066]: USER_START pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.714341 kernel: audit: type=1105 audit(1707472743.683:1444): pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.713000 audit[5068]: CRED_ACQ pid=5068 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:03.739341 kernel: audit: type=1103 audit(1707472743.713:1445): pid=5068 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:04.002269 sshd[5066]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:04.002000 audit[5066]: USER_END pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:04.005802 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 09:59:04.006482 systemd[1]: sshd@8-10.200.20.4:22-10.200.12.6:59436.service: Deactivated successfully. Feb 9 09:59:04.002000 audit[5066]: CRED_DISP pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:04.058252 kernel: audit: type=1106 audit(1707472744.002:1446): pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:04.058386 kernel: audit: type=1104 audit(1707472744.002:1447): pid=5066 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:04.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:59436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:04.058543 systemd-logind[1340]: Session 11 logged out. Waiting for processes to exit. Feb 9 09:59:04.059395 systemd-logind[1340]: Removed session 11. Feb 9 09:59:09.069606 systemd[1]: Started sshd@9-10.200.20.4:22-10.200.12.6:40002.service. Feb 9 09:59:09.100442 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:09.100562 kernel: audit: type=1130 audit(1707472749.069:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:40002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:09.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:40002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:09.445000 audit[5119]: USER_ACCT pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.446135 sshd[5119]: Accepted publickey for core from 10.200.12.6 port 40002 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:09.448155 sshd[5119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:09.472519 kernel: audit: type=1101 audit(1707472749.445:1450): pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.472640 kernel: audit: type=1103 audit(1707472749.447:1451): pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.447000 audit[5119]: CRED_ACQ pid=5119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.513635 kernel: audit: type=1006 audit(1707472749.447:1452): pid=5119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 09:59:09.447000 audit[5119]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd598720 a2=3 a3=1 items=0 ppid=1 pid=5119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:09.540829 kernel: audit: type=1300 audit(1707472749.447:1452): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd598720 a2=3 a3=1 items=0 ppid=1 pid=5119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:09.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:09.550947 kernel: audit: type=1327 audit(1707472749.447:1452): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:09.552952 systemd-logind[1340]: New session 12 of user core. Feb 9 09:59:09.553443 systemd[1]: Started session-12.scope. Feb 9 09:59:09.557000 audit[5119]: USER_START pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.588000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.612678 kernel: audit: type=1105 audit(1707472749.557:1453): pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.612787 kernel: audit: type=1103 audit(1707472749.588:1454): pid=5121 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.878576 sshd[5119]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:09.879000 audit[5119]: USER_END pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.909160 systemd[1]: sshd@9-10.200.20.4:22-10.200.12.6:40002.service: Deactivated successfully. Feb 9 09:59:09.909956 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 09:59:09.881000 audit[5119]: CRED_DISP pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.935795 kernel: audit: type=1106 audit(1707472749.879:1455): pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.935904 kernel: audit: type=1104 audit(1707472749.881:1456): pid=5119 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:09.936443 systemd-logind[1340]: Session 12 logged out. Waiting for processes to exit. Feb 9 09:59:09.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:40002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:09.938788 systemd-logind[1340]: Removed session 12. Feb 9 09:59:14.942386 systemd[1]: Started sshd@10-10.200.20.4:22-10.200.12.6:40012.service. Feb 9 09:59:14.973190 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:14.973288 kernel: audit: type=1130 audit(1707472754.941:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:40012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:14.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:40012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:15.318000 audit[5134]: USER_ACCT pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.319687 sshd[5134]: Accepted publickey for core from 10.200.12.6 port 40012 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:15.321439 sshd[5134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:15.319000 audit[5134]: CRED_ACQ pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.371123 kernel: audit: type=1101 audit(1707472755.318:1459): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.371269 kernel: audit: type=1103 audit(1707472755.319:1460): pid=5134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.386358 kernel: audit: type=1006 audit(1707472755.319:1461): pid=5134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 09:59:15.319000 audit[5134]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeb044b0 a2=3 a3=1 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:15.413320 kernel: audit: type=1300 audit(1707472755.319:1461): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeb044b0 a2=3 a3=1 items=0 ppid=1 pid=5134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:15.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:15.422818 kernel: audit: type=1327 audit(1707472755.319:1461): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:15.426241 systemd[1]: Started session-13.scope. Feb 9 09:59:15.427016 systemd-logind[1340]: New session 13 of user core. Feb 9 09:59:15.430000 audit[5134]: USER_START pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.431000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.484228 kernel: audit: type=1105 audit(1707472755.430:1462): pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.484329 kernel: audit: type=1103 audit(1707472755.431:1463): pid=5136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.715828 sshd[5134]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:15.716000 audit[5134]: USER_END pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.719565 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 09:59:15.720235 systemd[1]: sshd@10-10.200.20.4:22-10.200.12.6:40012.service: Deactivated successfully. Feb 9 09:59:15.716000 audit[5134]: CRED_DISP pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.771415 kernel: audit: type=1106 audit(1707472755.716:1464): pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.771518 kernel: audit: type=1104 audit(1707472755.716:1465): pid=5134 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:15.771626 systemd-logind[1340]: Session 13 logged out. Waiting for processes to exit. Feb 9 09:59:15.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:40012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:15.773433 systemd-logind[1340]: Removed session 13. Feb 9 09:59:20.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.12.6:48066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:20.780505 systemd[1]: Started sshd@11-10.200.20.4:22-10.200.12.6:48066.service. Feb 9 09:59:20.786232 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:20.786349 kernel: audit: type=1130 audit(1707472760.779:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.12.6:48066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:21.160000 audit[5148]: USER_ACCT pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.161858 sshd[5148]: Accepted publickey for core from 10.200.12.6 port 48066 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:21.187000 audit[5148]: CRED_ACQ pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.189573 sshd[5148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:21.215051 kernel: audit: type=1101 audit(1707472761.160:1468): pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.215206 kernel: audit: type=1103 audit(1707472761.187:1469): pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.231039 kernel: audit: type=1006 audit(1707472761.187:1470): pid=5148 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 09:59:21.187000 audit[5148]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd44917c0 a2=3 a3=1 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:21.258294 kernel: audit: type=1300 audit(1707472761.187:1470): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd44917c0 a2=3 a3=1 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:21.187000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:21.261908 systemd[1]: Started session-14.scope. Feb 9 09:59:21.267393 kernel: audit: type=1327 audit(1707472761.187:1470): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:21.267430 systemd-logind[1340]: New session 14 of user core. Feb 9 09:59:21.271000 audit[5148]: USER_START pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.272000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.325541 kernel: audit: type=1105 audit(1707472761.271:1471): pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.325639 kernel: audit: type=1103 audit(1707472761.272:1472): pid=5150 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.562858 sshd[5148]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:21.562000 audit[5148]: USER_END pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.567825 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 09:59:21.568679 systemd[1]: sshd@11-10.200.20.4:22-10.200.12.6:48066.service: Deactivated successfully. Feb 9 09:59:21.565000 audit[5148]: CRED_DISP pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.617920 kernel: audit: type=1106 audit(1707472761.562:1473): pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.618053 kernel: audit: type=1104 audit(1707472761.565:1474): pid=5148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:21.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.12.6:48066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:21.618396 systemd-logind[1340]: Session 14 logged out. Waiting for processes to exit. Feb 9 09:59:21.619106 systemd-logind[1340]: Removed session 14. Feb 9 09:59:25.736000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.736000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a5a990 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:25.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:25.736000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.736000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d7c240 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:25.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.877670 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 09:59:25.877784 kernel: audit: type=1400 audit(1707472765.870:1478): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.927552 kernel: audit: type=1400 audit(1707472765.870:1479): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40104b9c80 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.959487 kernel: audit: type=1300 audit(1707472765.870:1479): arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40104b9c80 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.959617 kernel: audit: type=1327 audit(1707472765.870:1479): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.870000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=401404c270 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:26.017765 kernel: audit: type=1300 audit(1707472765.870:1478): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=401404c270 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:26.045498 kernel: audit: type=1327 audit(1707472765.870:1478): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.876000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.071322 kernel: audit: type=1400 audit(1707472765.876:1480): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.071503 kernel: audit: type=1300 audit(1707472765.876:1480): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4010c2a720 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.876000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4010c2a720 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.876000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:26.131769 kernel: audit: type=1327 audit(1707472765.876:1480): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.877000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.158879 kernel: audit: type=1400 audit(1707472765.877:1481): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.877000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=401404c330 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.877000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.886000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.886000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=401404c480 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:25.886000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.886000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=401404c4b0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 09:59:25.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 09:59:26.626446 systemd[1]: Started sshd@12-10.200.20.4:22-10.200.12.6:48076.service. Feb 9 09:59:26.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.12.6:48076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:27.002000 audit[5160]: USER_ACCT pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.002708 sshd[5160]: Accepted publickey for core from 10.200.12.6 port 48076 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:27.004288 sshd[5160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:27.003000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.003000 audit[5160]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0600df0 a2=3 a3=1 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:27.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:27.008070 systemd-logind[1340]: New session 15 of user core. Feb 9 09:59:27.008561 systemd[1]: Started session-15.scope. Feb 9 09:59:27.012000 audit[5160]: USER_START pid=5160 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.014000 audit[5162]: CRED_ACQ pid=5162 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.343213 sshd[5160]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:27.344000 audit[5160]: USER_END pid=5160 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.344000 audit[5160]: CRED_DISP pid=5160 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:27.346393 systemd-logind[1340]: Session 15 logged out. Waiting for processes to exit. Feb 9 09:59:27.346551 systemd[1]: sshd@12-10.200.20.4:22-10.200.12.6:48076.service: Deactivated successfully. Feb 9 09:59:27.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.12.6:48076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:27.347330 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 09:59:27.348067 systemd-logind[1340]: Removed session 15. Feb 9 09:59:30.297000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:30.297000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000cf3d20 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:30.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:30.302000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:30.302000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d7c8e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:30.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:30.302000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:30.302000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d7c920 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:30.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:30.302000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:30.302000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d7c960 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 09:59:30.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:32.437975 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 9 09:59:32.438117 kernel: audit: type=1130 audit(1707472772.407:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.12.6:52236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:32.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.12.6:52236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:32.409035 systemd[1]: Started sshd@13-10.200.20.4:22-10.200.12.6:52236.service. Feb 9 09:59:32.639031 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.wxGiyF.mount: Deactivated successfully. Feb 9 09:59:32.788000 audit[5197]: USER_ACCT pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.791394 sshd[5197]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:32.792197 sshd[5197]: Accepted publickey for core from 10.200.12.6 port 52236 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:32.789000 audit[5197]: CRED_ACQ pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.843536 kernel: audit: type=1101 audit(1707472772.788:1498): pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.843663 kernel: audit: type=1103 audit(1707472772.789:1499): pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.860827 kernel: audit: type=1006 audit(1707472772.789:1500): pid=5197 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 09:59:32.789000 audit[5197]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefc46c10 a2=3 a3=1 items=0 ppid=1 pid=5197 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:32.889085 kernel: audit: type=1300 audit(1707472772.789:1500): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefc46c10 a2=3 a3=1 items=0 ppid=1 pid=5197 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:32.891082 systemd[1]: Started session-16.scope. Feb 9 09:59:32.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:32.900770 kernel: audit: type=1327 audit(1707472772.789:1500): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:32.892449 systemd-logind[1340]: New session 16 of user core. Feb 9 09:59:32.903000 audit[5197]: USER_START pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.934000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.960645 kernel: audit: type=1105 audit(1707472772.903:1501): pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:32.960799 kernel: audit: type=1103 audit(1707472772.934:1502): pid=5218 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.219531 sshd[5197]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:33.219000 audit[5197]: USER_END pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.220000 audit[5197]: CRED_DISP pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.251840 systemd[1]: sshd@13-10.200.20.4:22-10.200.12.6:52236.service: Deactivated successfully. Feb 9 09:59:33.252668 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 09:59:33.254140 systemd-logind[1340]: Session 16 logged out. Waiting for processes to exit. Feb 9 09:59:33.255107 systemd-logind[1340]: Removed session 16. Feb 9 09:59:33.276935 kernel: audit: type=1106 audit(1707472773.219:1503): pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.277077 kernel: audit: type=1104 audit(1707472773.220:1504): pid=5197 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.12.6:52236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:33.290116 systemd[1]: Started sshd@14-10.200.20.4:22-10.200.12.6:52252.service. Feb 9 09:59:33.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.12.6:52252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:33.706352 sshd[5229]: Accepted publickey for core from 10.200.12.6 port 52252 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:33.704000 audit[5229]: USER_ACCT pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.707979 sshd[5229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:33.706000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.706000 audit[5229]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7d61d60 a2=3 a3=1 items=0 ppid=1 pid=5229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:33.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:33.712451 systemd[1]: Started session-17.scope. Feb 9 09:59:33.713062 systemd-logind[1340]: New session 17 of user core. Feb 9 09:59:33.716000 audit[5229]: USER_START pid=5229 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:33.718000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:34.776592 sshd[5229]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:34.776000 audit[5229]: USER_END pid=5229 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:34.777000 audit[5229]: CRED_DISP pid=5229 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:34.779960 systemd[1]: sshd@14-10.200.20.4:22-10.200.12.6:52252.service: Deactivated successfully. Feb 9 09:59:34.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.12.6:52252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:34.780743 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 09:59:34.781292 systemd-logind[1340]: Session 17 logged out. Waiting for processes to exit. Feb 9 09:59:34.782431 systemd-logind[1340]: Removed session 17. Feb 9 09:59:34.841483 systemd[1]: Started sshd@15-10.200.20.4:22-10.200.12.6:52258.service. Feb 9 09:59:34.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.12.6:52258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:35.224550 sshd[5239]: Accepted publickey for core from 10.200.12.6 port 52258 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:35.223000 audit[5239]: USER_ACCT pid=5239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.225974 sshd[5239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:35.224000 audit[5239]: CRED_ACQ pid=5239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.224000 audit[5239]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc77e2ad0 a2=3 a3=1 items=0 ppid=1 pid=5239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:35.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:35.230659 systemd[1]: Started session-18.scope. Feb 9 09:59:35.230962 systemd-logind[1340]: New session 18 of user core. Feb 9 09:59:35.233000 audit[5239]: USER_START pid=5239 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.235000 audit[5241]: CRED_ACQ pid=5241 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.294844 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.iUFPKs.mount: Deactivated successfully. Feb 9 09:59:35.336438 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.bEGzwb.mount: Deactivated successfully. Feb 9 09:59:35.572536 sshd[5239]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:35.572000 audit[5239]: USER_END pid=5239 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.572000 audit[5239]: CRED_DISP pid=5239 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:35.575505 systemd-logind[1340]: Session 18 logged out. Waiting for processes to exit. Feb 9 09:59:35.576708 systemd[1]: sshd@15-10.200.20.4:22-10.200.12.6:52258.service: Deactivated successfully. Feb 9 09:59:35.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.12.6:52258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:35.577474 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 09:59:35.578786 systemd-logind[1340]: Removed session 18. Feb 9 09:59:40.644516 systemd[1]: Started sshd@16-10.200.20.4:22-10.200.12.6:60976.service. Feb 9 09:59:40.691849 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 09:59:40.691936 kernel: audit: type=1130 audit(1707472780.643:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.12.6:60976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:40.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.12.6:60976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:40.753000 audit[4680]: AVC avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:59:40.753000 audit[4680]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001b04120 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:59:40.813671 kernel: audit: type=1400 audit(1707472780.753:1525): avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 09:59:40.813800 kernel: audit: type=1300 audit(1707472780.753:1525): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001b04120 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 09:59:40.813856 kernel: audit: type=1327 audit(1707472780.753:1525): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:40.753000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:40.950000 audit[4720]: AVC avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:59:40.950000 audit[4720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001da7b20 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:59:41.011235 kernel: audit: type=1400 audit(1707472780.950:1526): avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 09:59:41.011361 kernel: audit: type=1300 audit(1707472780.950:1526): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001da7b20 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 09:59:40.950000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:41.039127 kernel: audit: type=1327 audit(1707472780.950:1526): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:59:41.076000 audit[5290]: USER_ACCT pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.079403 sshd[5290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:41.086273 sshd[5290]: Accepted publickey for core from 10.200.12.6 port 60976 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:41.077000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.113953 systemd[1]: Started session-19.scope. Feb 9 09:59:41.116119 systemd-logind[1340]: New session 19 of user core. Feb 9 09:59:41.131215 kernel: audit: type=1101 audit(1707472781.076:1527): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.131350 kernel: audit: type=1103 audit(1707472781.077:1528): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.147902 kernel: audit: type=1006 audit(1707472781.077:1529): pid=5290 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 09:59:41.077000 audit[5290]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee5637b0 a2=3 a3=1 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:41.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:41.119000 audit[5290]: USER_START pid=5290 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.128000 audit[5294]: CRED_ACQ pid=5294 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.433686 sshd[5290]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:41.433000 audit[5290]: USER_END pid=5290 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.433000 audit[5290]: CRED_DISP pid=5290 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:41.436909 systemd-logind[1340]: Session 19 logged out. Waiting for processes to exit. Feb 9 09:59:41.438136 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 09:59:41.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.12.6:60976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:41.438903 systemd[1]: sshd@16-10.200.20.4:22-10.200.12.6:60976.service: Deactivated successfully. Feb 9 09:59:41.440094 systemd-logind[1340]: Removed session 19. Feb 9 09:59:46.498458 systemd[1]: Started sshd@17-10.200.20.4:22-10.200.12.6:60978.service. Feb 9 09:59:46.528395 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 09:59:46.528506 kernel: audit: type=1130 audit(1707472786.497:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.12.6:60978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:46.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.12.6:60978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:46.874000 audit[5308]: USER_ACCT pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:46.876429 sshd[5308]: Accepted publickey for core from 10.200.12.6 port 60978 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:46.877782 sshd[5308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:46.876000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:46.929935 kernel: audit: type=1101 audit(1707472786.874:1536): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:46.930063 kernel: audit: type=1103 audit(1707472786.876:1537): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:46.948221 kernel: audit: type=1006 audit(1707472786.876:1538): pid=5308 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 09:59:46.876000 audit[5308]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcccdac30 a2=3 a3=1 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:46.949373 kernel: audit: type=1300 audit(1707472786.876:1538): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcccdac30 a2=3 a3=1 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:46.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:46.987567 kernel: audit: type=1327 audit(1707472786.876:1538): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:46.987071 systemd[1]: Started session-20.scope. Feb 9 09:59:46.987187 systemd-logind[1340]: New session 20 of user core. Feb 9 09:59:46.990000 audit[5308]: USER_START pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.020000 audit[5311]: CRED_ACQ pid=5311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.046693 kernel: audit: type=1105 audit(1707472786.990:1539): pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.046806 kernel: audit: type=1103 audit(1707472787.020:1540): pid=5311 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.300255 sshd[5308]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:47.299000 audit[5308]: USER_END pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.303635 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 09:59:47.304346 systemd[1]: sshd@17-10.200.20.4:22-10.200.12.6:60978.service: Deactivated successfully. Feb 9 09:59:47.301000 audit[5308]: CRED_DISP pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.355739 kernel: audit: type=1106 audit(1707472787.299:1541): pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.355889 kernel: audit: type=1104 audit(1707472787.301:1542): pid=5308 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:47.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.12.6:60978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:47.356244 systemd-logind[1340]: Session 20 logged out. Waiting for processes to exit. Feb 9 09:59:47.357023 systemd-logind[1340]: Removed session 20. Feb 9 09:59:52.377447 systemd[1]: Started sshd@18-10.200.20.4:22-10.200.12.6:39216.service. Feb 9 09:59:52.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.12.6:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:52.382877 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:52.383007 kernel: audit: type=1130 audit(1707472792.377:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.12.6:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:52.813000 audit[5326]: USER_ACCT pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.814062 sshd[5326]: Accepted publickey for core from 10.200.12.6 port 39216 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:52.815807 sshd[5326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:52.815000 audit[5326]: CRED_ACQ pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.866312 kernel: audit: type=1101 audit(1707472792.813:1545): pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.866431 kernel: audit: type=1103 audit(1707472792.815:1546): pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.882710 kernel: audit: type=1006 audit(1707472792.815:1547): pid=5326 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 09:59:52.815000 audit[5326]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffec375e0 a2=3 a3=1 items=0 ppid=1 pid=5326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:52.910340 kernel: audit: type=1300 audit(1707472792.815:1547): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffec375e0 a2=3 a3=1 items=0 ppid=1 pid=5326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:52.912439 systemd-logind[1340]: New session 21 of user core. Feb 9 09:59:52.815000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:52.912890 systemd[1]: Started session-21.scope. Feb 9 09:59:52.922644 kernel: audit: type=1327 audit(1707472792.815:1547): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:52.926000 audit[5326]: USER_START pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.956000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.981267 kernel: audit: type=1105 audit(1707472792.926:1548): pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:52.981424 kernel: audit: type=1103 audit(1707472792.956:1549): pid=5329 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:53.263041 sshd[5326]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:53.263000 audit[5326]: USER_END pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:53.295287 systemd[1]: sshd@18-10.200.20.4:22-10.200.12.6:39216.service: Deactivated successfully. Feb 9 09:59:53.264000 audit[5326]: CRED_DISP pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:53.321753 kernel: audit: type=1106 audit(1707472793.263:1550): pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:53.321888 kernel: audit: type=1104 audit(1707472793.264:1551): pid=5326 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:53.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.12.6:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:53.296118 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 09:59:53.322171 systemd-logind[1340]: Session 21 logged out. Waiting for processes to exit. Feb 9 09:59:53.323036 systemd-logind[1340]: Removed session 21. Feb 9 09:59:58.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:58296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:58.335003 systemd[1]: Started sshd@19-10.200.20.4:22-10.200.12.6:58296.service. Feb 9 09:59:58.341136 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:59:58.341242 kernel: audit: type=1130 audit(1707472798.334:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:58296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:58.401603 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.7sdgpS.mount: Deactivated successfully. Feb 9 09:59:58.746000 audit[5345]: USER_ACCT pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.747778 sshd[5345]: Accepted publickey for core from 10.200.12.6 port 58296 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:59:58.774000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.776894 sshd[5345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:59:58.800934 kernel: audit: type=1101 audit(1707472798.746:1554): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.801056 kernel: audit: type=1103 audit(1707472798.774:1555): pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.819109 kernel: audit: type=1006 audit(1707472798.775:1556): pid=5345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 09:59:58.775000 audit[5345]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1325e20 a2=3 a3=1 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.846962 kernel: audit: type=1300 audit(1707472798.775:1556): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1325e20 a2=3 a3=1 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.848430 kernel: audit: type=1327 audit(1707472798.775:1556): proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:58.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:59:58.851813 systemd[1]: Started session-22.scope. Feb 9 09:59:58.857231 systemd-logind[1340]: New session 22 of user core. Feb 9 09:59:58.860000 audit[5345]: USER_START pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.862000 audit[5368]: CRED_ACQ pid=5368 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.915366 kernel: audit: type=1105 audit(1707472798.860:1557): pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:58.915506 kernel: audit: type=1103 audit(1707472798.862:1558): pid=5368 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:59.182752 sshd[5345]: pam_unix(sshd:session): session closed for user core Feb 9 09:59:59.182000 audit[5345]: USER_END pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:59.185519 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 09:59:59.186480 systemd[1]: sshd@19-10.200.20.4:22-10.200.12.6:58296.service: Deactivated successfully. Feb 9 09:59:59.182000 audit[5345]: CRED_DISP pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:59.238816 kernel: audit: type=1106 audit(1707472799.182:1559): pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:59.238949 kernel: audit: type=1104 audit(1707472799.182:1560): pid=5345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:59:59.238923 systemd-logind[1340]: Session 22 logged out. Waiting for processes to exit. Feb 9 09:59:59.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:58296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:59:59.239885 systemd-logind[1340]: Removed session 22. Feb 9 10:00:02.475858 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.jrx13Q.mount: Deactivated successfully. Feb 9 10:00:02.639585 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.tvRCVi.mount: Deactivated successfully. Feb 9 10:00:04.251959 systemd[1]: Started sshd@20-10.200.20.4:22-10.200.12.6:58298.service. Feb 9 10:00:04.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:58298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:04.258073 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:04.258209 kernel: audit: type=1130 audit(1707472804.251:1562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:58298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:04.659000 audit[5421]: USER_ACCT pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.661292 sshd[5421]: Accepted publickey for core from 10.200.12.6 port 58298 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:04.662268 sshd[5421]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:04.661000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.690848 systemd-logind[1340]: New session 23 of user core. Feb 9 10:00:04.691985 systemd[1]: Started session-23.scope. Feb 9 10:00:04.712146 kernel: audit: type=1101 audit(1707472804.659:1563): pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.712283 kernel: audit: type=1103 audit(1707472804.661:1564): pid=5421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.728583 kernel: audit: type=1006 audit(1707472804.661:1565): pid=5421 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 10:00:04.661000 audit[5421]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdefc40d0 a2=3 a3=1 items=0 ppid=1 pid=5421 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:04.755218 kernel: audit: type=1300 audit(1707472804.661:1565): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdefc40d0 a2=3 a3=1 items=0 ppid=1 pid=5421 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:04.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:04.765693 kernel: audit: type=1327 audit(1707472804.661:1565): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:04.713000 audit[5421]: USER_START pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.794783 kernel: audit: type=1105 audit(1707472804.713:1566): pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.714000 audit[5427]: CRED_ACQ pid=5427 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:04.822200 kernel: audit: type=1103 audit(1707472804.714:1567): pid=5427 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.009798 sshd[5421]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:05.010000 audit[5421]: USER_END pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.013270 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:00:05.013952 systemd[1]: sshd@20-10.200.20.4:22-10.200.12.6:58298.service: Deactivated successfully. Feb 9 10:00:05.042741 systemd-logind[1340]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:00:05.010000 audit[5421]: CRED_DISP pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.044019 systemd-logind[1340]: Removed session 23. Feb 9 10:00:05.067469 kernel: audit: type=1106 audit(1707472805.010:1568): pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.067616 kernel: audit: type=1104 audit(1707472805.010:1569): pid=5421 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:58298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:05.073923 systemd[1]: Started sshd@21-10.200.20.4:22-10.200.12.6:58308.service. Feb 9 10:00:05.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.12.6:58308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:05.289021 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.mceLRU.mount: Deactivated successfully. Feb 9 10:00:05.454000 audit[5437]: USER_ACCT pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.454727 sshd[5437]: Accepted publickey for core from 10.200.12.6 port 58308 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:05.455000 audit[5437]: CRED_ACQ pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.455000 audit[5437]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2f98880 a2=3 a3=1 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:05.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:05.456213 sshd[5437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:05.460427 systemd[1]: Started session-24.scope. Feb 9 10:00:05.460809 systemd-logind[1340]: New session 24 of user core. Feb 9 10:00:05.464000 audit[5437]: USER_START pid=5437 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.466000 audit[5479]: CRED_ACQ pid=5479 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.876372 sshd[5437]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:05.877000 audit[5437]: USER_END pid=5437 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.877000 audit[5437]: CRED_DISP pid=5437 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:05.879515 systemd-logind[1340]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:00:05.879535 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:00:05.880244 systemd[1]: sshd@21-10.200.20.4:22-10.200.12.6:58308.service: Deactivated successfully. Feb 9 10:00:05.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.12.6:58308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:05.881450 systemd-logind[1340]: Removed session 24. Feb 9 10:00:05.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.12.6:58314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:05.942846 systemd[1]: Started sshd@22-10.200.20.4:22-10.200.12.6:58314.service. Feb 9 10:00:06.283664 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.mNELdi.mount: Deactivated successfully. Feb 9 10:00:06.321000 audit[5487]: USER_ACCT pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:06.322496 sshd[5487]: Accepted publickey for core from 10.200.12.6 port 58314 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:06.323000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:06.323000 audit[5487]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd21da3f0 a2=3 a3=1 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:06.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:06.324181 sshd[5487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:06.328149 systemd-logind[1340]: New session 25 of user core. Feb 9 10:00:06.328662 systemd[1]: Started session-25.scope. Feb 9 10:00:06.333000 audit[5487]: USER_START pid=5487 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:06.334000 audit[5489]: CRED_ACQ pid=5489 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.288000 audit[5499]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.288000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffdf555a40 a2=0 a3=ffffbbba06c0 items=0 ppid=2654 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.289000 audit[5499]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.289000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffdf555a40 a2=0 a3=ffffbbba06c0 items=0 ppid=2654 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.305000 audit[5501]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=5501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.305000 audit[5501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffdd668d30 a2=0 a3=ffffb038c6c0 items=0 ppid=2654 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.305000 audit[5501]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.305000 audit[5501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffdd668d30 a2=0 a3=ffffb038c6c0 items=0 ppid=2654 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.382357 sshd[5487]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:07.383000 audit[5487]: USER_END pid=5487 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.383000 audit[5487]: CRED_DISP pid=5487 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.12.6:58314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:07.386337 systemd[1]: sshd@22-10.200.20.4:22-10.200.12.6:58314.service: Deactivated successfully. Feb 9 10:00:07.386655 systemd-logind[1340]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:00:07.387094 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:00:07.388351 systemd-logind[1340]: Removed session 25. Feb 9 10:00:07.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.12.6:59262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:07.458106 systemd[1]: Started sshd@23-10.200.20.4:22-10.200.12.6:59262.service. Feb 9 10:00:07.844000 audit[5504]: USER_ACCT pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.844948 sshd[5504]: Accepted publickey for core from 10.200.12.6 port 59262 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:07.845000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.846000 audit[5504]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd0b6b60 a2=3 a3=1 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:07.846715 sshd[5504]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:07.850490 systemd-logind[1340]: New session 26 of user core. Feb 9 10:00:07.850975 systemd[1]: Started session-26.scope. Feb 9 10:00:07.855000 audit[5504]: USER_START pid=5504 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:07.856000 audit[5506]: CRED_ACQ pid=5506 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.373488 sshd[5504]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:08.374000 audit[5504]: USER_END pid=5504 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.374000 audit[5504]: CRED_DISP pid=5504 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.376224 systemd[1]: sshd@23-10.200.20.4:22-10.200.12.6:59262.service: Deactivated successfully. Feb 9 10:00:08.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.12.6:59262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:08.377127 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 10:00:08.377824 systemd-logind[1340]: Session 26 logged out. Waiting for processes to exit. Feb 9 10:00:08.378807 systemd-logind[1340]: Removed session 26. Feb 9 10:00:08.442239 systemd[1]: Started sshd@24-10.200.20.4:22-10.200.12.6:59266.service. Feb 9 10:00:08.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.12.6:59266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:08.824000 audit[5514]: USER_ACCT pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.825850 sshd[5514]: Accepted publickey for core from 10.200.12.6 port 59266 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:08.825000 audit[5514]: CRED_ACQ pid=5514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.825000 audit[5514]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9ff5570 a2=3 a3=1 items=0 ppid=1 pid=5514 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:08.827453 sshd[5514]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:08.831684 systemd[1]: Started session-27.scope. Feb 9 10:00:08.832011 systemd-logind[1340]: New session 27 of user core. Feb 9 10:00:08.835000 audit[5514]: USER_START pid=5514 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:08.836000 audit[5516]: CRED_ACQ pid=5516 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:09.166420 sshd[5514]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:09.167000 audit[5514]: USER_END pid=5514 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:09.167000 audit[5514]: CRED_DISP pid=5514 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:09.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.12.6:59266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:09.170174 systemd-logind[1340]: Session 27 logged out. Waiting for processes to exit. Feb 9 10:00:09.170366 systemd[1]: sshd@24-10.200.20.4:22-10.200.12.6:59266.service: Deactivated successfully. Feb 9 10:00:09.171130 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 10:00:09.171893 systemd-logind[1340]: Removed session 27. Feb 9 10:00:14.232643 systemd[1]: Started sshd@25-10.200.20.4:22-10.200.12.6:59268.service. Feb 9 10:00:14.263796 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 10:00:14.263915 kernel: audit: type=1130 audit(1707472814.231:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:14.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:14.608000 audit[5528]: USER_ACCT pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.610264 sshd[5528]: Accepted publickey for core from 10.200.12.6 port 59268 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:14.611815 sshd[5528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:14.610000 audit[5528]: CRED_ACQ pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.638410 kernel: audit: type=1101 audit(1707472814.608:1612): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.681006 kernel: audit: type=1103 audit(1707472814.610:1613): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.681123 kernel: audit: type=1006 audit(1707472814.610:1614): pid=5528 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 10:00:14.610000 audit[5528]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc612ca00 a2=3 a3=1 items=0 ppid=1 pid=5528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:14.709721 kernel: audit: type=1300 audit(1707472814.610:1614): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc612ca00 a2=3 a3=1 items=0 ppid=1 pid=5528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:14.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:14.713329 systemd[1]: Started session-28.scope. Feb 9 10:00:14.718731 kernel: audit: type=1327 audit(1707472814.610:1614): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:14.718815 systemd-logind[1340]: New session 28 of user core. Feb 9 10:00:14.721000 audit[5528]: USER_START pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.753000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.779134 kernel: audit: type=1105 audit(1707472814.721:1615): pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:14.779279 kernel: audit: type=1103 audit(1707472814.753:1616): pid=5530 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:15.038329 sshd[5528]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:15.037000 audit[5528]: USER_END pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:15.041858 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 10:00:15.042538 systemd[1]: sshd@25-10.200.20.4:22-10.200.12.6:59268.service: Deactivated successfully. Feb 9 10:00:15.037000 audit[5528]: CRED_DISP pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:15.096049 kernel: audit: type=1106 audit(1707472815.037:1617): pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:15.097177 kernel: audit: type=1104 audit(1707472815.037:1618): pid=5528 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:15.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:15.098187 systemd-logind[1340]: Session 28 logged out. Waiting for processes to exit. Feb 9 10:00:15.099177 systemd-logind[1340]: Removed session 28. Feb 9 10:00:20.102513 systemd[1]: Started sshd@26-10.200.20.4:22-10.200.12.6:50756.service. Feb 9 10:00:20.134932 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:20.135030 kernel: audit: type=1130 audit(1707472820.101:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.4:22-10.200.12.6:50756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:20.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.4:22-10.200.12.6:50756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:20.479000 audit[5556]: USER_ACCT pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.481801 sshd[5556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:20.482839 sshd[5556]: Accepted publickey for core from 10.200.12.6 port 50756 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:20.481000 audit[5556]: CRED_ACQ pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.533000 kernel: audit: type=1101 audit(1707472820.479:1621): pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.533113 kernel: audit: type=1103 audit(1707472820.481:1622): pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.549332 kernel: audit: type=1006 audit(1707472820.481:1623): pid=5556 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 10:00:20.481000 audit[5556]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee23b130 a2=3 a3=1 items=0 ppid=1 pid=5556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:20.577498 kernel: audit: type=1300 audit(1707472820.481:1623): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee23b130 a2=3 a3=1 items=0 ppid=1 pid=5556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:20.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:20.587228 kernel: audit: type=1327 audit(1707472820.481:1623): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:20.589548 systemd-logind[1340]: New session 29 of user core. Feb 9 10:00:20.590048 systemd[1]: Started session-29.scope. Feb 9 10:00:20.594000 audit[5556]: USER_START pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.624000 audit[5558]: CRED_ACQ pid=5558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.649424 kernel: audit: type=1105 audit(1707472820.594:1624): pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.649543 kernel: audit: type=1103 audit(1707472820.624:1625): pid=5558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.901348 sshd[5556]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:20.902000 audit[5556]: USER_END pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.903982 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 10:00:20.904678 systemd[1]: sshd@26-10.200.20.4:22-10.200.12.6:50756.service: Deactivated successfully. Feb 9 10:00:20.934155 systemd-logind[1340]: Session 29 logged out. Waiting for processes to exit. Feb 9 10:00:20.934906 systemd-logind[1340]: Removed session 29. Feb 9 10:00:20.902000 audit[5556]: CRED_DISP pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.962351 kernel: audit: type=1106 audit(1707472820.902:1626): pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.962478 kernel: audit: type=1104 audit(1707472820.902:1627): pid=5556 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:20.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.4:22-10.200.12.6:50756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:25.736000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.743250 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:25.743369 kernel: audit: type=1400 audit(1707472825.736:1629): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.736000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a1fe90 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:25.803864 kernel: audit: type=1300 audit(1707472825.736:1629): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a1fe90 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:25.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:25.832572 kernel: audit: type=1327 audit(1707472825.736:1629): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:25.832706 kernel: audit: type=1400 audit(1707472825.737:1630): avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.737000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.737000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001fce3a0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:25.890846 kernel: audit: type=1300 audit(1707472825.737:1630): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001fce3a0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:25.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:25.919063 kernel: audit: type=1327 audit(1707472825.737:1630): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:25.868000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.947887 kernel: audit: type=1400 audit(1707472825.868:1631): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.948034 kernel: audit: type=1300 audit(1707472825.868:1631): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007b9f7a0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.868000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007b9f7a0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:26.010401 kernel: audit: type=1327 audit(1707472825.868:1631): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:25.873000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:26.015206 systemd[1]: Started sshd@27-10.200.20.4:22-10.200.12.6:50770.service. Feb 9 10:00:26.038565 kernel: audit: type=1400 audit(1707472825.873:1632): avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.873000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400f25b740 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:25.878000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.878000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4004fe4390 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:25.878000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.878000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007b9f800 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:25.888000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.888000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400f25b950 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:25.888000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.888000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400f25ba70 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:00:25.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:00:26.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.20.4:22-10.200.12.6:50770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:26.427524 sshd[5569]: Accepted publickey for core from 10.200.12.6 port 50770 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:26.426000 audit[5569]: USER_ACCT pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.429089 sshd[5569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:26.427000 audit[5569]: CRED_ACQ pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.427000 audit[5569]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffba4ce70 a2=3 a3=1 items=0 ppid=1 pid=5569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:26.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:26.433549 systemd[1]: Started session-30.scope. Feb 9 10:00:26.434384 systemd-logind[1340]: New session 30 of user core. Feb 9 10:00:26.437000 audit[5569]: USER_START pid=5569 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.439000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.809556 sshd[5569]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:26.809000 audit[5569]: USER_END pid=5569 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.809000 audit[5569]: CRED_DISP pid=5569 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:26.812229 systemd-logind[1340]: Session 30 logged out. Waiting for processes to exit. Feb 9 10:00:26.812863 systemd[1]: sshd@27-10.200.20.4:22-10.200.12.6:50770.service: Deactivated successfully. Feb 9 10:00:26.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.20.4:22-10.200.12.6:50770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:26.813699 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 10:00:26.814426 systemd-logind[1340]: Removed session 30. Feb 9 10:00:28.398809 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.MvuseT.mount: Deactivated successfully. Feb 9 10:00:29.808000 audit[5605]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.808000 audit[5605]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff887dd60 a2=0 a3=ffffbedf06c0 items=0 ppid=2654 pid=5605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:29.810000 audit[5605]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=5605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.810000 audit[5605]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=fffff887dd60 a2=0 a3=ffffbedf06c0 items=0 ppid=2654 pid=5605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:30.298000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:30.298000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400024afc0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:30.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400024b000 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:30.303000 audit[2366]: AVC avc: denied { watch } for pid=2366 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400024b040 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:30.303000 audit[2366]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40012e5de0 a2=fc6 a3=0 items=0 ppid=2211 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:00:30.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:31.877686 systemd[1]: Started sshd@28-10.200.20.4:22-10.200.12.6:58318.service. Feb 9 10:00:31.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.20.4:22-10.200.12.6:58318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:31.886319 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 9 10:00:31.886429 kernel: audit: type=1130 audit(1707472831.876:1652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.20.4:22-10.200.12.6:58318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:32.255000 audit[5608]: USER_ACCT pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.257290 sshd[5608]: Accepted publickey for core from 10.200.12.6 port 58318 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:32.284338 kernel: audit: type=1101 audit(1707472832.255:1653): pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.284000 audit[5608]: CRED_ACQ pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.285982 sshd[5608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:32.327772 kernel: audit: type=1103 audit(1707472832.284:1654): pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.327883 kernel: audit: type=1006 audit(1707472832.284:1655): pid=5608 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 10:00:32.284000 audit[5608]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee47ea00 a2=3 a3=1 items=0 ppid=1 pid=5608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.331684 systemd-logind[1340]: New session 31 of user core. Feb 9 10:00:32.332228 systemd[1]: Started session-31.scope. Feb 9 10:00:32.356129 kernel: audit: type=1300 audit(1707472832.284:1655): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee47ea00 a2=3 a3=1 items=0 ppid=1 pid=5608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.356241 kernel: audit: type=1327 audit(1707472832.284:1655): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:32.284000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:32.365154 kernel: audit: type=1105 audit(1707472832.335:1656): pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.335000 audit[5608]: USER_START pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.337000 audit[5610]: CRED_ACQ pid=5610 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.419641 kernel: audit: type=1103 audit(1707472832.337:1657): pid=5610 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.637113 sshd[5608]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:32.636000 audit[5608]: USER_END pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.639712 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 10:00:32.640289 systemd[1]: sshd@28-10.200.20.4:22-10.200.12.6:58318.service: Deactivated successfully. Feb 9 10:00:32.642053 systemd-logind[1340]: Session 31 logged out. Waiting for processes to exit. Feb 9 10:00:32.642862 systemd-logind[1340]: Removed session 31. Feb 9 10:00:32.636000 audit[5608]: CRED_DISP pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.694047 kernel: audit: type=1106 audit(1707472832.636:1658): pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.694187 kernel: audit: type=1104 audit(1707472832.636:1659): pid=5608 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:32.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.20.4:22-10.200.12.6:58318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:35.294739 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.9BkWYN.mount: Deactivated successfully. Feb 9 10:00:35.335862 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.bu9deI.mount: Deactivated successfully. Feb 9 10:00:37.704292 systemd[1]: Started sshd@29-10.200.20.4:22-10.200.12.6:53320.service. Feb 9 10:00:37.735576 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:37.735687 kernel: audit: type=1130 audit(1707472837.703:1661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.20.4:22-10.200.12.6:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:37.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.20.4:22-10.200.12.6:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:38.081000 sshd[5681]: Accepted publickey for core from 10.200.12.6 port 53320 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:38.079000 audit[5681]: USER_ACCT pid=5681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.082475 sshd[5681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:38.080000 audit[5681]: CRED_ACQ pid=5681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.134180 kernel: audit: type=1101 audit(1707472838.079:1662): pid=5681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.134370 kernel: audit: type=1103 audit(1707472838.080:1663): pid=5681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.150060 kernel: audit: type=1006 audit(1707472838.080:1664): pid=5681 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 10:00:38.080000 audit[5681]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7b82df0 a2=3 a3=1 items=0 ppid=1 pid=5681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:38.177720 kernel: audit: type=1300 audit(1707472838.080:1664): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7b82df0 a2=3 a3=1 items=0 ppid=1 pid=5681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:38.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:38.189444 systemd-logind[1340]: New session 32 of user core. Feb 9 10:00:38.189743 systemd[1]: Started session-32.scope. Feb 9 10:00:38.190369 kernel: audit: type=1327 audit(1707472838.080:1664): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:38.192000 audit[5681]: USER_START pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.224344 kernel: audit: type=1105 audit(1707472838.192:1665): pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.222000 audit[5683]: CRED_ACQ pid=5683 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.249349 kernel: audit: type=1103 audit(1707472838.222:1666): pid=5683 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.505535 sshd[5681]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:38.505000 audit[5681]: USER_END pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.536912 systemd[1]: sshd@29-10.200.20.4:22-10.200.12.6:53320.service: Deactivated successfully. Feb 9 10:00:38.506000 audit[5681]: CRED_DISP pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.537753 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 10:00:38.562595 kernel: audit: type=1106 audit(1707472838.505:1667): pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.562724 kernel: audit: type=1104 audit(1707472838.506:1668): pid=5681 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:38.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.20.4:22-10.200.12.6:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:38.563390 systemd-logind[1340]: Session 32 logged out. Waiting for processes to exit. Feb 9 10:00:38.564472 systemd-logind[1340]: Removed session 32. Feb 9 10:00:40.754000 audit[4680]: AVC avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 10:00:40.754000 audit[4680]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000dda4e0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 10:00:40.754000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:40.951000 audit[4720]: AVC avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 10:00:40.951000 audit[4720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001dea3c0 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 10:00:40.951000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:43.625929 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:00:43.626073 kernel: audit: type=1130 audit(1707472843.595:1672): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.200.20.4:22-10.200.12.6:53330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:43.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.200.20.4:22-10.200.12.6:53330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:43.595894 systemd[1]: Started sshd@30-10.200.20.4:22-10.200.12.6:53330.service. Feb 9 10:00:43.974000 audit[5694]: USER_ACCT pid=5694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:43.978853 sshd[5694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:43.979655 sshd[5694]: Accepted publickey for core from 10.200.12.6 port 53330 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:43.977000 audit[5694]: CRED_ACQ pid=5694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.029669 kernel: audit: type=1101 audit(1707472843.974:1673): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.029768 kernel: audit: type=1103 audit(1707472843.977:1674): pid=5694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.046598 kernel: audit: type=1006 audit(1707472843.977:1675): pid=5694 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 10:00:43.977000 audit[5694]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd13e74f0 a2=3 a3=1 items=0 ppid=1 pid=5694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:44.076014 kernel: audit: type=1300 audit(1707472843.977:1675): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd13e74f0 a2=3 a3=1 items=0 ppid=1 pid=5694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:44.078610 systemd[1]: Started session-33.scope. Feb 9 10:00:44.088019 systemd-logind[1340]: New session 33 of user core. Feb 9 10:00:44.089337 kernel: audit: type=1327 audit(1707472843.977:1675): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:44.092000 audit[5694]: USER_START pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.124000 audit[5696]: CRED_ACQ pid=5696 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.125415 kernel: audit: type=1105 audit(1707472844.092:1676): pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.152351 kernel: audit: type=1103 audit(1707472844.124:1677): pid=5696 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.411435 sshd[5694]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:44.412000 audit[5694]: USER_END pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.419019 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 10:00:44.419879 systemd[1]: sshd@30-10.200.20.4:22-10.200.12.6:53330.service: Deactivated successfully. Feb 9 10:00:44.417000 audit[5694]: CRED_DISP pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.444055 systemd-logind[1340]: Session 33 logged out. Waiting for processes to exit. Feb 9 10:00:44.444975 systemd-logind[1340]: Removed session 33. Feb 9 10:00:44.468690 kernel: audit: type=1106 audit(1707472844.412:1678): pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.468831 kernel: audit: type=1104 audit(1707472844.417:1679): pid=5694 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:44.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.200.20.4:22-10.200.12.6:53330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:49.478398 systemd[1]: Started sshd@31-10.200.20.4:22-10.200.12.6:46732.service. Feb 9 10:00:49.509709 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:49.509826 kernel: audit: type=1130 audit(1707472849.477:1681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.200.20.4:22-10.200.12.6:46732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:49.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.200.20.4:22-10.200.12.6:46732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:49.857000 audit[5708]: USER_ACCT pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:49.859439 sshd[5708]: Accepted publickey for core from 10.200.12.6 port 46732 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:49.861138 sshd[5708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:49.859000 audit[5708]: CRED_ACQ pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:49.888400 kernel: audit: type=1101 audit(1707472849.857:1682): pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:49.933246 kernel: audit: type=1103 audit(1707472849.859:1683): pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:49.933373 kernel: audit: type=1006 audit(1707472849.859:1684): pid=5708 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 10:00:49.859000 audit[5708]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9a8e880 a2=3 a3=1 items=0 ppid=1 pid=5708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:49.963280 kernel: audit: type=1300 audit(1707472849.859:1684): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9a8e880 a2=3 a3=1 items=0 ppid=1 pid=5708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:49.859000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:49.972988 kernel: audit: type=1327 audit(1707472849.859:1684): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:49.965888 systemd[1]: Started session-34.scope. Feb 9 10:00:49.967061 systemd-logind[1340]: New session 34 of user core. Feb 9 10:00:49.968000 audit[5708]: USER_START pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.005358 kernel: audit: type=1105 audit(1707472849.968:1685): pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.006893 kernel: audit: type=1103 audit(1707472849.968:1686): pid=5710 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:49.968000 audit[5710]: CRED_ACQ pid=5710 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.258536 sshd[5708]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:50.258000 audit[5708]: USER_END pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.261973 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 10:00:50.262774 systemd[1]: sshd@31-10.200.20.4:22-10.200.12.6:46732.service: Deactivated successfully. Feb 9 10:00:50.259000 audit[5708]: CRED_DISP pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.324759 kernel: audit: type=1106 audit(1707472850.258:1687): pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.324904 kernel: audit: type=1104 audit(1707472850.259:1688): pid=5708 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:50.324830 systemd-logind[1340]: Session 34 logged out. Waiting for processes to exit. Feb 9 10:00:50.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.200.20.4:22-10.200.12.6:46732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:50.326411 systemd-logind[1340]: Removed session 34. Feb 9 10:00:55.323078 systemd[1]: Started sshd@32-10.200.20.4:22-10.200.12.6:46746.service. Feb 9 10:00:55.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.200.20.4:22-10.200.12.6:46746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:55.330163 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:55.330246 kernel: audit: type=1130 audit(1707472855.321:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.200.20.4:22-10.200.12.6:46746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:55.704000 audit[5721]: USER_ACCT pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.706049 sshd[5721]: Accepted publickey for core from 10.200.12.6 port 46746 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:55.737104 sshd[5721]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:55.735000 audit[5721]: CRED_ACQ pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.741978 systemd[1]: Started session-35.scope. Feb 9 10:00:55.743625 systemd-logind[1340]: New session 35 of user core. Feb 9 10:00:55.765092 kernel: audit: type=1101 audit(1707472855.704:1691): pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.765218 kernel: audit: type=1103 audit(1707472855.735:1692): pid=5721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.782600 kernel: audit: type=1006 audit(1707472855.735:1693): pid=5721 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 10:00:55.735000 audit[5721]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6867f60 a2=3 a3=1 items=0 ppid=1 pid=5721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:55.813110 kernel: audit: type=1300 audit(1707472855.735:1693): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6867f60 a2=3 a3=1 items=0 ppid=1 pid=5721 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:55.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:55.823338 kernel: audit: type=1327 audit(1707472855.735:1693): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:55.828630 kernel: audit: type=1105 audit(1707472855.747:1694): pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.747000 audit[5721]: USER_START pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.748000 audit[5723]: CRED_ACQ pid=5723 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.880177 kernel: audit: type=1103 audit(1707472855.748:1695): pid=5723 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.083546 sshd[5721]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:56.083000 audit[5721]: USER_END pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.087116 systemd-logind[1340]: Session 35 logged out. Waiting for processes to exit. Feb 9 10:00:56.088296 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 10:00:56.089573 systemd-logind[1340]: Removed session 35. Feb 9 10:00:56.090233 systemd[1]: sshd@32-10.200.20.4:22-10.200.12.6:46746.service: Deactivated successfully. Feb 9 10:00:56.084000 audit[5721]: CRED_DISP pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.142989 kernel: audit: type=1106 audit(1707472856.083:1696): pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.143121 kernel: audit: type=1104 audit(1707472856.084:1697): pid=5721 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.200.20.4:22-10.200.12.6:46746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:58.399062 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.CWeGep.mount: Deactivated successfully. Feb 9 10:01:01.148393 systemd[1]: Started sshd@33-10.200.20.4:22-10.200.12.6:43008.service. Feb 9 10:01:01.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.200.20.4:22-10.200.12.6:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:01.154544 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:01.154650 kernel: audit: type=1130 audit(1707472861.147:1699): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.200.20.4:22-10.200.12.6:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:01.527000 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.529539 sshd[5754]: Accepted publickey for core from 10.200.12.6 port 43008 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:01.531296 sshd[5754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:01.529000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.563205 systemd[1]: Started session-36.scope. Feb 9 10:01:01.564710 systemd-logind[1340]: New session 36 of user core. Feb 9 10:01:01.585012 kernel: audit: type=1101 audit(1707472861.527:1700): pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.585241 kernel: audit: type=1103 audit(1707472861.529:1701): pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.601827 kernel: audit: type=1006 audit(1707472861.529:1702): pid=5754 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 10:01:01.602200 kernel: audit: type=1300 audit(1707472861.529:1702): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6436170 a2=3 a3=1 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:01.529000 audit[5754]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6436170 a2=3 a3=1 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:01.529000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:01.640707 kernel: audit: type=1327 audit(1707472861.529:1702): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:01.640846 kernel: audit: type=1105 audit(1707472861.568:1703): pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.568000 audit[5754]: USER_START pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.671447 kernel: audit: type=1103 audit(1707472861.570:1704): pid=5756 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.570000 audit[5756]: CRED_ACQ pid=5756 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.887542 sshd[5754]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:01.887000 audit[5754]: USER_END pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.891572 systemd-logind[1340]: Session 36 logged out. Waiting for processes to exit. Feb 9 10:01:01.892787 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 10:01:01.893908 systemd-logind[1340]: Removed session 36. Feb 9 10:01:01.894549 systemd[1]: sshd@33-10.200.20.4:22-10.200.12.6:43008.service: Deactivated successfully. Feb 9 10:01:01.888000 audit[5754]: CRED_DISP pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.944514 kernel: audit: type=1106 audit(1707472861.887:1705): pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.944648 kernel: audit: type=1104 audit(1707472861.888:1706): pid=5754 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.200.20.4:22-10.200.12.6:43008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:02.475770 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.oCvmzZ.mount: Deactivated successfully. Feb 9 10:01:03.472142 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.Sb87vZ.mount: Deactivated successfully. Feb 9 10:01:05.287238 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.xe97m1.mount: Deactivated successfully. Feb 9 10:01:06.283556 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.ZqCx7U.mount: Deactivated successfully. Feb 9 10:01:06.957428 systemd[1]: Started sshd@34-10.200.20.4:22-10.200.12.6:47382.service. Feb 9 10:01:06.988173 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:06.988269 kernel: audit: type=1130 audit(1707472866.957:1708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.200.20.4:22-10.200.12.6:47382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:06.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.200.20.4:22-10.200.12.6:47382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:07.368000 audit[5847]: USER_ACCT pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.369545 sshd[5847]: Accepted publickey for core from 10.200.12.6 port 47382 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:07.371285 sshd[5847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:07.370000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.423821 kernel: audit: type=1101 audit(1707472867.368:1709): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.423983 kernel: audit: type=1103 audit(1707472867.370:1710): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.439997 kernel: audit: type=1006 audit(1707472867.370:1711): pid=5847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 10:01:07.370000 audit[5847]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa9a1180 a2=3 a3=1 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:07.468553 kernel: audit: type=1300 audit(1707472867.370:1711): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa9a1180 a2=3 a3=1 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:07.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:07.478782 kernel: audit: type=1327 audit(1707472867.370:1711): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:07.479479 systemd-logind[1340]: New session 37 of user core. Feb 9 10:01:07.479983 systemd[1]: Started session-37.scope. Feb 9 10:01:07.484000 audit[5847]: USER_START pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.486000 audit[5849]: CRED_ACQ pid=5849 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.545161 kernel: audit: type=1105 audit(1707472867.484:1712): pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.545299 kernel: audit: type=1103 audit(1707472867.486:1713): pid=5849 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.794812 sshd[5847]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:07.795000 audit[5847]: USER_END pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.797727 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 10:01:07.798570 systemd[1]: sshd@34-10.200.20.4:22-10.200.12.6:47382.service: Deactivated successfully. Feb 9 10:01:07.796000 audit[5847]: CRED_DISP pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.852462 kernel: audit: type=1106 audit(1707472867.795:1714): pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.852586 kernel: audit: type=1104 audit(1707472867.796:1715): pid=5847 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.200.20.4:22-10.200.12.6:47382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:07.852761 systemd-logind[1340]: Session 37 logged out. Waiting for processes to exit. Feb 9 10:01:07.853743 systemd-logind[1340]: Removed session 37. Feb 9 10:01:21.349552 systemd[1]: cri-containerd-234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9.scope: Deactivated successfully. Feb 9 10:01:21.349871 systemd[1]: cri-containerd-234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9.scope: Consumed 6.267s CPU time. Feb 9 10:01:21.348000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:01:21.356138 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:21.356291 kernel: audit: type=1334 audit(1707472881.348:1717): prog-id=121 op=UNLOAD Feb 9 10:01:21.365000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:01:21.375389 kernel: audit: type=1334 audit(1707472881.365:1718): prog-id=124 op=UNLOAD Feb 9 10:01:21.388332 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9-rootfs.mount: Deactivated successfully. Feb 9 10:01:21.389419 env[1354]: time="2024-02-09T10:01:21.389374936Z" level=info msg="shim disconnected" id=234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9 Feb 9 10:01:21.389851 env[1354]: time="2024-02-09T10:01:21.389830720Z" level=warning msg="cleaning up after shim disconnected" id=234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9 namespace=k8s.io Feb 9 10:01:21.389946 env[1354]: time="2024-02-09T10:01:21.389931917Z" level=info msg="cleaning up dead shim" Feb 9 10:01:21.397905 env[1354]: time="2024-02-09T10:01:21.397864839Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:01:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5872 runtime=io.containerd.runc.v2\n" Feb 9 10:01:21.531079 kubelet[2478]: I0209 10:01:21.531049 2478 scope.go:117] "RemoveContainer" containerID="234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9" Feb 9 10:01:21.534149 env[1354]: time="2024-02-09T10:01:21.534104714Z" level=info msg="CreateContainer within sandbox \"badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 10:01:21.563069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3097470570.mount: Deactivated successfully. Feb 9 10:01:21.569853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4278276696.mount: Deactivated successfully. Feb 9 10:01:21.593140 env[1354]: time="2024-02-09T10:01:21.593089050Z" level=info msg="CreateContainer within sandbox \"badc97da7df7285b69cec5007debfe00cd18960fe35c8e27c3498c5ba5e12c2e\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154\"" Feb 9 10:01:21.593705 env[1354]: time="2024-02-09T10:01:21.593677350Z" level=info msg="StartContainer for \"11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154\"" Feb 9 10:01:21.608205 systemd[1]: Started cri-containerd-11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154.scope. Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.644371 kernel: audit: type=1400 audit(1707472881.621:1719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.644498 kernel: audit: type=1400 audit(1707472881.621:1720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.688114 kernel: audit: type=1400 audit(1707472881.621:1721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.710635 kernel: audit: type=1400 audit(1707472881.621:1722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.732524 kernel: audit: type=1400 audit(1707472881.621:1723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.756221 kernel: audit: type=1400 audit(1707472881.621:1724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.781331 kernel: audit: type=1400 audit(1707472881.621:1725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.807015 kernel: audit: type=1400 audit(1707472881.621:1726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.621000 audit: BPF prog-id=199 op=LOAD Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2604 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353733626436643539333263373362346332323634653061383530 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2604 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353733626436643539333263373362346332323634653061383530 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.627000 audit: BPF prog-id=200 op=LOAD Feb 9 10:01:21.627000 audit[5892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2604 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353733626436643539333263373362346332323634653061383530 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.642000 audit: BPF prog-id=201 op=LOAD Feb 9 10:01:21.642000 audit[5892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2604 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353733626436643539333263373362346332323634653061383530 Feb 9 10:01:21.642000 audit: BPF prog-id=201 op=UNLOAD Feb 9 10:01:21.642000 audit: BPF prog-id=200 op=UNLOAD Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { perfmon } for pid=5892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit[5892]: AVC avc: denied { bpf } for pid=5892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:21.643000 audit: BPF prog-id=202 op=LOAD Feb 9 10:01:21.643000 audit[5892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2604 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131353733626436643539333263373362346332323634653061383530 Feb 9 10:01:21.815177 env[1354]: time="2024-02-09T10:01:21.815122244Z" level=info msg="StartContainer for \"11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154\" returns successfully" Feb 9 10:01:23.267611 systemd[1]: cri-containerd-24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494.scope: Deactivated successfully. Feb 9 10:01:23.267914 systemd[1]: cri-containerd-24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494.scope: Consumed 3.908s CPU time. Feb 9 10:01:23.270000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:01:23.270000 audit: BPF prog-id=93 op=UNLOAD Feb 9 10:01:23.287925 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494-rootfs.mount: Deactivated successfully. Feb 9 10:01:23.289530 env[1354]: time="2024-02-09T10:01:23.289487214Z" level=info msg="shim disconnected" id=24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494 Feb 9 10:01:23.289919 env[1354]: time="2024-02-09T10:01:23.289898320Z" level=warning msg="cleaning up after shim disconnected" id=24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494 namespace=k8s.io Feb 9 10:01:23.289991 env[1354]: time="2024-02-09T10:01:23.289978917Z" level=info msg="cleaning up dead shim" Feb 9 10:01:23.297890 env[1354]: time="2024-02-09T10:01:23.297849485Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:01:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5932 runtime=io.containerd.runc.v2\n" Feb 9 10:01:23.537422 kubelet[2478]: I0209 10:01:23.536906 2478 scope.go:117] "RemoveContainer" containerID="24f9599b2c74f85dcb39b931bd2c7b65dfb9215e2a33f854328633d940385494" Feb 9 10:01:23.539772 env[1354]: time="2024-02-09T10:01:23.539732516Z" level=info msg="CreateContainer within sandbox \"f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 10:01:23.584019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3487661065.mount: Deactivated successfully. Feb 9 10:01:23.604327 env[1354]: time="2024-02-09T10:01:23.604274723Z" level=info msg="CreateContainer within sandbox \"f9740344966fe0f9e0ede8531e721c2b54d5d858cb0d932c48de2ed912dab795\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"a96d0214a7ac0925acfa4fd85d9888f9388eb9db40bf1445168c3412b7fd7b9e\"" Feb 9 10:01:23.604910 env[1354]: time="2024-02-09T10:01:23.604884702Z" level=info msg="StartContainer for \"a96d0214a7ac0925acfa4fd85d9888f9388eb9db40bf1445168c3412b7fd7b9e\"" Feb 9 10:01:23.630191 systemd[1]: Started cri-containerd-a96d0214a7ac0925acfa4fd85d9888f9388eb9db40bf1445168c3412b7fd7b9e.scope. Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.648000 audit: BPF prog-id=203 op=LOAD Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2211 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366430323134613761633039323561636661346664383564393838 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2211 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366430323134613761633039323561636661346664383564393838 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit: BPF prog-id=204 op=LOAD Feb 9 10:01:23.649000 audit[5953]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2211 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366430323134613761633039323561636661346664383564393838 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit: BPF prog-id=205 op=LOAD Feb 9 10:01:23.649000 audit[5953]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2211 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366430323134613761633039323561636661346664383564393838 Feb 9 10:01:23.649000 audit: BPF prog-id=205 op=UNLOAD Feb 9 10:01:23.649000 audit: BPF prog-id=204 op=UNLOAD Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { perfmon } for pid=5953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit[5953]: AVC avc: denied { bpf } for pid=5953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:23.649000 audit: BPF prog-id=206 op=LOAD Feb 9 10:01:23.649000 audit[5953]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2211 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366430323134613761633039323561636661346664383564393838 Feb 9 10:01:23.681215 env[1354]: time="2024-02-09T10:01:23.681157703Z" level=info msg="StartContainer for \"a96d0214a7ac0925acfa4fd85d9888f9388eb9db40bf1445168c3412b7fd7b9e\" returns successfully" Feb 9 10:01:23.729643 kubelet[2478]: E0209 10:01:23.729386 2478 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:01:25.156000 audit[5964]: AVC avc: denied { watch } for pid=5964 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.156000 audit[5964]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009ce1b0 a2=fc6 a3=0 items=0 ppid=2211 pid=5964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:01:25.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:25.156000 audit[5964]: AVC avc: denied { watch } for pid=5964 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.156000 audit[5964]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000bd2040 a2=fc6 a3=0 items=0 ppid=2211 pid=5964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c930 key=(null) Feb 9 10:01:25.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:25.872000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.872000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=400f0f9520 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:25.873000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.873000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012996390 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:25.878000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.878000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012a8b4d0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:25.878000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.878000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=400890e560 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:25.889000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.889000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012a8b6e0 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:25.889000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.889000 audit[2341]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012a8b740 a2=fc6 a3=0 items=0 ppid=2195 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c14,c370 key=(null) Feb 9 10:01:25.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 10:01:26.327295 systemd[1]: cri-containerd-7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407.scope: Deactivated successfully. Feb 9 10:01:26.327614 systemd[1]: cri-containerd-7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407.scope: Consumed 3.846s CPU time. Feb 9 10:01:26.331000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:01:26.331000 audit: BPF prog-id=102 op=UNLOAD Feb 9 10:01:26.346895 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407-rootfs.mount: Deactivated successfully. Feb 9 10:01:26.348109 env[1354]: time="2024-02-09T10:01:26.348062266Z" level=info msg="shim disconnected" id=7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407 Feb 9 10:01:26.348109 env[1354]: time="2024-02-09T10:01:26.348109625Z" level=warning msg="cleaning up after shim disconnected" id=7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407 namespace=k8s.io Feb 9 10:01:26.348520 env[1354]: time="2024-02-09T10:01:26.348119264Z" level=info msg="cleaning up dead shim" Feb 9 10:01:26.355811 env[1354]: time="2024-02-09T10:01:26.355764204Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:01:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5993 runtime=io.containerd.runc.v2\n" Feb 9 10:01:26.545650 kubelet[2478]: I0209 10:01:26.545620 2478 scope.go:117] "RemoveContainer" containerID="7dc5703c5c6d825800745cb5e4a6fa1d581abb0ec6dfcd80474733feb3777407" Feb 9 10:01:26.547778 env[1354]: time="2024-02-09T10:01:26.547736669Z" level=info msg="CreateContainer within sandbox \"dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 10:01:26.590073 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount202693257.mount: Deactivated successfully. Feb 9 10:01:26.597756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3331929268.mount: Deactivated successfully. Feb 9 10:01:26.624594 env[1354]: time="2024-02-09T10:01:26.624549694Z" level=info msg="CreateContainer within sandbox \"dff9884c23a4082c6c562fd40fafcb2a1de870c7956eebb8659acf0b7acb222e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ee235a5c3705ba6b92de628cd69f3d85f398ea7ad73f11e95465c63198a5325b\"" Feb 9 10:01:26.625983 env[1354]: time="2024-02-09T10:01:26.625950686Z" level=info msg="StartContainer for \"ee235a5c3705ba6b92de628cd69f3d85f398ea7ad73f11e95465c63198a5325b\"" Feb 9 10:01:26.641649 systemd[1]: Started cri-containerd-ee235a5c3705ba6b92de628cd69f3d85f398ea7ad73f11e95465c63198a5325b.scope. Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.659397 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 10:01:26.659523 kernel: audit: type=1400 audit(1707472886.651:1767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.703342 kernel: audit: type=1400 audit(1707472886.651:1768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.725272 kernel: audit: type=1400 audit(1707472886.651:1769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.748968 kernel: audit: type=1400 audit(1707472886.651:1770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.774514 kernel: audit: type=1400 audit(1707472886.651:1771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.796994 kernel: audit: type=1400 audit(1707472886.651:1772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.797357 kernel: audit: type=1400 audit(1707472886.651:1773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.840323 kernel: audit: type=1400 audit(1707472886.651:1774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.861532 kernel: audit: type=1400 audit(1707472886.651:1775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.883513 kernel: audit: type=1400 audit(1707472886.651:1776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.651000 audit: BPF prog-id=207 op=LOAD Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2168 pid=6014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:26.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565323335613563333730356261366239326465363238636436396633 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2168 pid=6014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:26.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565323335613563333730356261366239326465363238636436396633 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.658000 audit: BPF prog-id=208 op=LOAD Feb 9 10:01:26.658000 audit[6014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2168 pid=6014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:26.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565323335613563333730356261366239326465363238636436396633 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.679000 audit: BPF prog-id=209 op=LOAD Feb 9 10:01:26.679000 audit[6014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2168 pid=6014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:26.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565323335613563333730356261366239326465363238636436396633 Feb 9 10:01:26.702000 audit: BPF prog-id=209 op=UNLOAD Feb 9 10:01:26.702000 audit: BPF prog-id=208 op=UNLOAD Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { perfmon } for pid=6014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit[6014]: AVC avc: denied { bpf } for pid=6014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:26.702000 audit: BPF prog-id=210 op=LOAD Feb 9 10:01:26.702000 audit[6014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2168 pid=6014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:26.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565323335613563333730356261366239326465363238636436396633 Feb 9 10:01:26.898411 env[1354]: time="2024-02-09T10:01:26.898368931Z" level=info msg="StartContainer for \"ee235a5c3705ba6b92de628cd69f3d85f398ea7ad73f11e95465c63198a5325b\" returns successfully" Feb 9 10:01:28.397609 systemd[1]: run-containerd-runc-k8s.io-4d447c522338301ec82678e49e9485d6051f7e9bf1c56ee82b7d5ccd1e8312bf-runc.t5fInY.mount: Deactivated successfully. Feb 9 10:01:28.589848 kubelet[2478]: E0209 10:01:28.589814 2478 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:60944->10.200.20.22:2379: read: connection timed out" Feb 9 10:01:29.804848 kubelet[2478]: W0209 10:01:29.804821 2478 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:01:31.981474 kubelet[2478]: I0209 10:01:31.981433 2478 status_manager.go:853] "Failed to get status for pod" podUID="ddfaf2d5-fb68-4257-ba38-82c87c611a68" pod="tigera-operator/tigera-operator-55585899bf-sswx8" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:60878->10.200.20.22:2379: read: connection timed out" Feb 9 10:01:32.636808 systemd[1]: run-containerd-runc-k8s.io-68249b0faf1ff64d5320a24e3a0c7bbfbc3a54addf44a48d9e09e04703b4f788-runc.a0NJm6.mount: Deactivated successfully. Feb 9 10:01:33.327990 systemd[1]: cri-containerd-11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154.scope: Deactivated successfully. Feb 9 10:01:33.327000 audit: BPF prog-id=199 op=UNLOAD Feb 9 10:01:33.334507 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 10:01:33.334610 kernel: audit: type=1334 audit(1707472893.327:1785): prog-id=199 op=UNLOAD Feb 9 10:01:33.343000 audit: BPF prog-id=202 op=UNLOAD Feb 9 10:01:33.355365 kernel: audit: type=1334 audit(1707472893.343:1786): prog-id=202 op=UNLOAD Feb 9 10:01:33.366228 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154-rootfs.mount: Deactivated successfully. Feb 9 10:01:33.473644 env[1354]: time="2024-02-09T10:01:33.473594416Z" level=info msg="shim disconnected" id=11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154 Feb 9 10:01:33.473644 env[1354]: time="2024-02-09T10:01:33.473641454Z" level=warning msg="cleaning up after shim disconnected" id=11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154 namespace=k8s.io Feb 9 10:01:33.474057 env[1354]: time="2024-02-09T10:01:33.473651294Z" level=info msg="cleaning up dead shim" Feb 9 10:01:33.481601 env[1354]: time="2024-02-09T10:01:33.481553754Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:01:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6098 runtime=io.containerd.runc.v2\n" Feb 9 10:01:33.517205 kubelet[2478]: E0209 10:01:33.517083 2478 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-08b227d6a8.17b22988c4a268ac", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-08b227d6a8", UID:"86aba46eed8c1e5421e9034fcd60c385", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-08b227d6a8"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 1, 16, 118108332, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 1, 16, 118108332, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-08b227d6a8"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:60762->10.200.20.22:2379: read: connection timed out' (will not retry!) Feb 9 10:01:33.562991 kubelet[2478]: I0209 10:01:33.561713 2478 scope.go:117] "RemoveContainer" containerID="234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9" Feb 9 10:01:33.562991 kubelet[2478]: I0209 10:01:33.562370 2478 scope.go:117] "RemoveContainer" containerID="11573bd6d5932c73b4c2264e0a850536d392439c6d4c526b33df8de9821b3154" Feb 9 10:01:33.562991 kubelet[2478]: E0209 10:01:33.562955 2478 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-55585899bf-sswx8_tigera-operator(ddfaf2d5-fb68-4257-ba38-82c87c611a68)\"" pod="tigera-operator/tigera-operator-55585899bf-sswx8" podUID="ddfaf2d5-fb68-4257-ba38-82c87c611a68" Feb 9 10:01:33.563168 env[1354]: time="2024-02-09T10:01:33.562790605Z" level=info msg="RemoveContainer for \"234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9\"" Feb 9 10:01:33.573135 env[1354]: time="2024-02-09T10:01:33.572783997Z" level=info msg="RemoveContainer for \"234580ea55d915732bef764c83d339eed1175d4904c27f910b09e762a1945ae9\" returns successfully" Feb 9 10:01:35.291712 systemd[1]: run-containerd-runc-k8s.io-efd71ceb9d03d0c747e5f30613b8e1437c8f6f25ab04d09392b26e757aaf458e-runc.JBQ85J.mount: Deactivated successfully. Feb 9 10:01:35.333443 systemd[1]: run-containerd-runc-k8s.io-4248025569e8a1e71361d8c669c576258f6d89949dfbfa2890c82945d6acb38c-runc.u4Ti0T.mount: Deactivated successfully. Feb 9 10:01:38.590464 kubelet[2478]: E0209 10:01:38.590421 2478 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-08b227d6a8?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:01:40.756000 audit[4680]: AVC avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 10:01:40.756000 audit[4680]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400030d5c0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 10:01:40.820818 kernel: audit: type=1400 audit(1707472900.756:1787): avc: denied { watch } for pid=4680 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.3040941773/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c933,c1016 tclass=file permissive=0 Feb 9 10:01:40.820932 kernel: audit: type=1300 audit(1707472900.756:1787): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400030d5c0 a2=fc6 a3=0 items=0 ppid=4573 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c933,c1016 key=(null) Feb 9 10:01:40.756000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:40.850348 kernel: audit: type=1327 audit(1707472900.756:1787): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:40.952000 audit[4720]: AVC avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 10:01:40.952000 audit[4720]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001da62e0 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 10:01:41.017320 kernel: audit: type=1400 audit(1707472900.952:1788): avc: denied { watch } for pid=4720 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_57_35.744190581/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c992 tclass=file permissive=0 Feb 9 10:01:41.017456 kernel: audit: type=1300 audit(1707472900.952:1788): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001da62e0 a2=fc6 a3=0 items=0 ppid=4628 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c992 key=(null) Feb 9 10:01:40.952000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:41.047195 kernel: audit: type=1327 audit(1707472900.952:1788): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:43.316344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.334046 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.353745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.372696 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.391062 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.409859 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.410081 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.434406 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.434642 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.456599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.456878 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.467339 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.490279 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.490545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.512206 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.512465 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.533664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.533941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.554811 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.555096 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.576818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:01:43.577119 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#135 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001