Feb 9 10:24:30.013906 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:24:30.013924 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:24:30.013933 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 10:24:30.013940 kernel: printk: bootconsole [pl11] enabled Feb 9 10:24:30.013945 kernel: efi: EFI v2.70 by EDK II Feb 9 10:24:30.013950 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 10:24:30.013957 kernel: random: crng init done Feb 9 10:24:30.013962 kernel: ACPI: Early table checksum verification disabled Feb 9 10:24:30.013967 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 10:24:30.013973 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.013978 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.013985 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 10:24:30.013990 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.013995 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014002 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014008 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014014 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014021 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014027 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 10:24:30.014032 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:24:30.014038 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 10:24:30.014044 kernel: NUMA: Failed to initialise from firmware Feb 9 10:24:30.014050 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:24:30.014056 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Feb 9 10:24:30.014061 kernel: Zone ranges: Feb 9 10:24:30.014067 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 10:24:30.014073 kernel: DMA32 empty Feb 9 10:24:30.014079 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:24:30.014085 kernel: Movable zone start for each node Feb 9 10:24:30.014091 kernel: Early memory node ranges Feb 9 10:24:30.014096 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 10:24:30.014102 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 10:24:30.014108 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 10:24:30.014113 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 10:24:30.014119 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 10:24:30.014124 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 10:24:30.014130 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 10:24:30.014135 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 10:24:30.014141 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:24:30.014148 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:24:30.014157 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 10:24:30.014163 kernel: psci: probing for conduit method from ACPI. Feb 9 10:24:30.014169 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:24:30.014175 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:24:30.014181 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 10:24:30.014187 kernel: psci: SMC Calling Convention v1.4 Feb 9 10:24:30.014193 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 10:24:30.014199 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 10:24:30.014205 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:24:30.014211 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:24:30.014218 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 10:24:30.014223 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:24:30.014230 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:24:30.014236 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:24:30.014242 kernel: CPU features: detected: Spectre-BHB Feb 9 10:24:30.014248 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:24:30.014255 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:24:30.014261 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:24:30.014267 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 10:24:30.014273 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 10:24:30.014280 kernel: Policy zone: Normal Feb 9 10:24:30.014287 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:24:30.014294 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:24:30.014300 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:24:30.014306 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:24:30.014312 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:24:30.014319 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 10:24:30.014326 kernel: Memory: 3991928K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202232K reserved, 0K cma-reserved) Feb 9 10:24:30.014332 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 10:24:30.014338 kernel: trace event string verifier disabled Feb 9 10:24:30.014344 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:24:30.014351 kernel: rcu: RCU event tracing is enabled. Feb 9 10:24:30.014357 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 10:24:30.014363 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:24:30.014369 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:24:30.014375 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:24:30.014381 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 10:24:30.014388 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:24:30.014394 kernel: GICv3: 960 SPIs implemented Feb 9 10:24:30.014400 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:24:30.014406 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:24:30.014412 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:24:30.014418 kernel: GICv3: 16 PPIs implemented Feb 9 10:24:30.014424 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 10:24:30.014430 kernel: ITS: No ITS available, not enabling LPIs Feb 9 10:24:30.014437 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:24:30.014443 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:24:30.014449 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:24:30.014455 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:24:30.014462 kernel: Console: colour dummy device 80x25 Feb 9 10:24:30.014469 kernel: printk: console [tty1] enabled Feb 9 10:24:30.014475 kernel: ACPI: Core revision 20210730 Feb 9 10:24:30.014482 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:24:30.014488 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:24:30.014494 kernel: LSM: Security Framework initializing Feb 9 10:24:30.014500 kernel: SELinux: Initializing. Feb 9 10:24:30.014507 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:24:30.014513 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:24:30.014520 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 10:24:30.014527 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 10:24:30.014533 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:24:30.014539 kernel: Remapping and enabling EFI services. Feb 9 10:24:30.014545 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:24:30.014552 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:24:30.014558 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 10:24:30.014564 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:24:30.014588 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:24:30.014596 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 10:24:30.014602 kernel: SMP: Total of 2 processors activated. Feb 9 10:24:30.014609 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:24:30.014615 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 10:24:30.014621 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:24:30.014628 kernel: CPU features: detected: CRC32 instructions Feb 9 10:24:30.014634 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:24:30.014640 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:24:30.014646 kernel: CPU features: detected: Privileged Access Never Feb 9 10:24:30.014654 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:24:30.014660 kernel: alternatives: patching kernel code Feb 9 10:24:30.014671 kernel: devtmpfs: initialized Feb 9 10:24:30.014678 kernel: KASLR enabled Feb 9 10:24:30.014685 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:24:30.014692 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 10:24:30.014698 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:24:30.014705 kernel: SMBIOS 3.1.0 present. Feb 9 10:24:30.014712 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 10:24:30.014718 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:24:30.014726 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:24:30.014733 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:24:30.014739 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:24:30.014746 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:24:30.014753 kernel: audit: type=2000 audit(0.088:1): state=initialized audit_enabled=0 res=1 Feb 9 10:24:30.014759 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:24:30.014766 kernel: cpuidle: using governor menu Feb 9 10:24:30.014774 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:24:30.014780 kernel: ASID allocator initialised with 32768 entries Feb 9 10:24:30.014787 kernel: ACPI: bus type PCI registered Feb 9 10:24:30.014793 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:24:30.014800 kernel: Serial: AMBA PL011 UART driver Feb 9 10:24:30.014806 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:24:30.014813 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:24:30.014819 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:24:30.014826 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:24:30.014833 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:24:30.014840 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:24:30.014846 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:24:30.014853 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:24:30.014859 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:24:30.014866 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:24:30.014873 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:24:30.014879 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:24:30.014886 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:24:30.014893 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:24:30.014900 kernel: ACPI: Interpreter enabled Feb 9 10:24:30.014906 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:24:30.014913 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:24:30.014920 kernel: printk: console [ttyAMA0] enabled Feb 9 10:24:30.014926 kernel: printk: bootconsole [pl11] disabled Feb 9 10:24:30.014933 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 10:24:30.014939 kernel: iommu: Default domain type: Translated Feb 9 10:24:30.014946 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:24:30.014953 kernel: vgaarb: loaded Feb 9 10:24:30.014960 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:24:30.014967 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Feb 9 10:24:30.014973 kernel: PTP clock support registered Feb 9 10:24:30.014980 kernel: Registered efivars operations Feb 9 10:24:30.014987 kernel: No ACPI PMU IRQ for CPU0 Feb 9 10:24:30.014993 kernel: No ACPI PMU IRQ for CPU1 Feb 9 10:24:30.014999 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:24:30.015006 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:24:30.015014 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:24:30.015020 kernel: pnp: PnP ACPI init Feb 9 10:24:30.015027 kernel: pnp: PnP ACPI: found 0 devices Feb 9 10:24:30.015033 kernel: NET: Registered PF_INET protocol family Feb 9 10:24:30.015040 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:24:30.015047 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:24:30.015053 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:24:30.015060 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:24:30.015067 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:24:30.015075 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:24:30.015081 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:24:30.015088 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:24:30.015095 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:24:30.015101 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:24:30.015108 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 10:24:30.015114 kernel: kvm [1]: HYP mode not available Feb 9 10:24:30.015121 kernel: Initialise system trusted keyrings Feb 9 10:24:30.015127 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:24:30.015135 kernel: Key type asymmetric registered Feb 9 10:24:30.015141 kernel: Asymmetric key parser 'x509' registered Feb 9 10:24:30.015148 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:24:30.015154 kernel: io scheduler mq-deadline registered Feb 9 10:24:30.015161 kernel: io scheduler kyber registered Feb 9 10:24:30.015167 kernel: io scheduler bfq registered Feb 9 10:24:30.015174 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:24:30.015180 kernel: thunder_xcv, ver 1.0 Feb 9 10:24:30.015187 kernel: thunder_bgx, ver 1.0 Feb 9 10:24:30.015195 kernel: nicpf, ver 1.0 Feb 9 10:24:30.015201 kernel: nicvf, ver 1.0 Feb 9 10:24:30.015313 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:24:30.015374 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:24:29 UTC (1707474269) Feb 9 10:24:30.015383 kernel: efifb: probing for efifb Feb 9 10:24:30.015390 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 10:24:30.015397 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 10:24:30.015403 kernel: efifb: scrolling: redraw Feb 9 10:24:30.015412 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 10:24:30.015419 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:24:30.015426 kernel: fb0: EFI VGA frame buffer device Feb 9 10:24:30.015432 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 10:24:30.015439 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:24:30.015445 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:24:30.015452 kernel: Segment Routing with IPv6 Feb 9 10:24:30.015458 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:24:30.015465 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:24:30.015472 kernel: Key type dns_resolver registered Feb 9 10:24:30.015479 kernel: registered taskstats version 1 Feb 9 10:24:30.015485 kernel: Loading compiled-in X.509 certificates Feb 9 10:24:30.015492 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:24:30.015499 kernel: Key type .fscrypt registered Feb 9 10:24:30.015505 kernel: Key type fscrypt-provisioning registered Feb 9 10:24:30.015512 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:24:30.015518 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:24:30.015525 kernel: ima: No architecture policies found Feb 9 10:24:30.015532 kernel: Freeing unused kernel memory: 34688K Feb 9 10:24:30.015539 kernel: Run /init as init process Feb 9 10:24:30.015545 kernel: with arguments: Feb 9 10:24:30.015552 kernel: /init Feb 9 10:24:30.015558 kernel: with environment: Feb 9 10:24:30.015564 kernel: HOME=/ Feb 9 10:24:30.015592 kernel: TERM=linux Feb 9 10:24:30.015599 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:24:30.015607 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:24:30.015618 systemd[1]: Detected virtualization microsoft. Feb 9 10:24:30.015625 systemd[1]: Detected architecture arm64. Feb 9 10:24:30.015632 systemd[1]: Running in initrd. Feb 9 10:24:30.015639 systemd[1]: No hostname configured, using default hostname. Feb 9 10:24:30.015646 systemd[1]: Hostname set to <localhost>. Feb 9 10:24:30.015653 systemd[1]: Initializing machine ID from random generator. Feb 9 10:24:30.015660 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:24:30.015668 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:24:30.015675 systemd[1]: Reached target cryptsetup.target. Feb 9 10:24:30.015682 systemd[1]: Reached target paths.target. Feb 9 10:24:30.015689 systemd[1]: Reached target slices.target. Feb 9 10:24:30.015696 systemd[1]: Reached target swap.target. Feb 9 10:24:30.015703 systemd[1]: Reached target timers.target. Feb 9 10:24:30.015710 systemd[1]: Listening on iscsid.socket. Feb 9 10:24:30.015717 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:24:30.015726 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:24:30.015733 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:24:30.015740 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:24:30.015747 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:24:30.015754 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:24:30.015761 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:24:30.015768 systemd[1]: Reached target sockets.target. Feb 9 10:24:30.015775 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:24:30.015782 systemd[1]: Finished network-cleanup.service. Feb 9 10:24:30.015790 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:24:30.015797 systemd[1]: Starting systemd-journald.service... Feb 9 10:24:30.015804 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:24:30.015811 systemd[1]: Starting systemd-resolved.service... Feb 9 10:24:30.015818 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:24:30.015829 systemd-journald[276]: Journal started Feb 9 10:24:30.015864 systemd-journald[276]: Runtime Journal (/run/log/journal/1511756d139c4592a294d480a72bd1e4) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:24:29.999453 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 10:24:30.034442 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:24:30.042656 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 10:24:30.063553 kernel: Bridge firewalling registered Feb 9 10:24:30.063587 systemd[1]: Started systemd-journald.service. Feb 9 10:24:30.063600 kernel: SCSI subsystem initialized Feb 9 10:24:30.060759 systemd-resolved[278]: Positive Trust Anchors: Feb 9 10:24:30.086648 kernel: audit: type=1130 audit(1707474270.067:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.060766 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:24:30.123267 kernel: audit: type=1130 audit(1707474270.090:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.123285 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:24:30.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.060794 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:24:30.190525 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:24:30.190544 kernel: audit: type=1130 audit(1707474270.127:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.190554 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:24:30.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.062825 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 10:24:30.242849 kernel: audit: type=1130 audit(1707474270.185:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.242869 kernel: audit: type=1130 audit(1707474270.215:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.082865 systemd[1]: Started systemd-resolved.service. Feb 9 10:24:30.090932 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:24:30.276851 kernel: audit: type=1130 audit(1707474270.250:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.127810 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:24:30.185969 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:24:30.205665 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 10:24:30.216292 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:24:30.251156 systemd[1]: Reached target nss-lookup.target. Feb 9 10:24:30.284981 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:24:30.293467 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:24:30.309880 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:24:30.327745 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:24:30.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.358916 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:24:30.363480 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:24:30.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.392108 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:24:30.421111 kernel: audit: type=1130 audit(1707474270.337:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.421611 kernel: audit: type=1130 audit(1707474270.363:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.421628 kernel: audit: type=1130 audit(1707474270.373:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.421702 dracut-cmdline[299]: dracut-dracut-053 Feb 9 10:24:30.426225 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:24:30.509589 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:24:30.520582 kernel: iscsi: registered transport (tcp) Feb 9 10:24:30.539609 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:24:30.539656 kernel: QLogic iSCSI HBA Driver Feb 9 10:24:30.568335 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:24:30.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:30.573450 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:24:30.625595 kernel: raid6: neonx8 gen() 13816 MB/s Feb 9 10:24:30.645580 kernel: raid6: neonx8 xor() 10835 MB/s Feb 9 10:24:30.665578 kernel: raid6: neonx4 gen() 13560 MB/s Feb 9 10:24:30.687578 kernel: raid6: neonx4 xor() 11201 MB/s Feb 9 10:24:30.707577 kernel: raid6: neonx2 gen() 12988 MB/s Feb 9 10:24:30.727577 kernel: raid6: neonx2 xor() 10347 MB/s Feb 9 10:24:30.748577 kernel: raid6: neonx1 gen() 10514 MB/s Feb 9 10:24:30.768577 kernel: raid6: neonx1 xor() 8790 MB/s Feb 9 10:24:30.789577 kernel: raid6: int64x8 gen() 6297 MB/s Feb 9 10:24:30.810578 kernel: raid6: int64x8 xor() 3551 MB/s Feb 9 10:24:30.830577 kernel: raid6: int64x4 gen() 7262 MB/s Feb 9 10:24:30.850577 kernel: raid6: int64x4 xor() 3858 MB/s Feb 9 10:24:30.871578 kernel: raid6: int64x2 gen() 6149 MB/s Feb 9 10:24:30.891577 kernel: raid6: int64x2 xor() 3322 MB/s Feb 9 10:24:30.911577 kernel: raid6: int64x1 gen() 5047 MB/s Feb 9 10:24:30.936520 kernel: raid6: int64x1 xor() 2647 MB/s Feb 9 10:24:30.936529 kernel: raid6: using algorithm neonx8 gen() 13816 MB/s Feb 9 10:24:30.936538 kernel: raid6: .... xor() 10835 MB/s, rmw enabled Feb 9 10:24:30.940749 kernel: raid6: using neon recovery algorithm Feb 9 10:24:30.957580 kernel: xor: measuring software checksum speed Feb 9 10:24:30.961579 kernel: 8regs : 17282 MB/sec Feb 9 10:24:30.969435 kernel: 32regs : 20755 MB/sec Feb 9 10:24:30.969444 kernel: arm64_neon : 27882 MB/sec Feb 9 10:24:30.969452 kernel: xor: using function: arm64_neon (27882 MB/sec) Feb 9 10:24:31.028605 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:24:31.037700 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:24:31.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:31.045000 audit: BPF prog-id=7 op=LOAD Feb 9 10:24:31.045000 audit: BPF prog-id=8 op=LOAD Feb 9 10:24:31.046531 systemd[1]: Starting systemd-udevd.service... Feb 9 10:24:31.060973 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 10:24:31.067049 systemd[1]: Started systemd-udevd.service. Feb 9 10:24:31.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:31.076981 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:24:31.091624 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 10:24:31.118864 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:24:31.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:31.124037 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:24:31.156474 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:24:31.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:31.212592 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 10:24:31.225598 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 10:24:31.234327 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 10:24:31.234359 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 10:24:31.239788 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 10:24:31.240582 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 9 10:24:31.269713 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 9 10:24:31.269740 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 10:24:31.269862 kernel: scsi host0: storvsc_host_t Feb 9 10:24:31.269886 kernel: scsi host1: storvsc_host_t Feb 9 10:24:31.279985 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 10:24:31.288582 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 10:24:31.315622 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 10:24:31.315803 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 10:24:31.324549 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 10:24:31.324701 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 10:24:31.329352 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 10:24:31.341880 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 10:24:31.342019 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 10:24:31.342100 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 10:24:31.353580 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:24:31.360588 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 10:24:31.372583 kernel: hv_netvsc 002248bc-8d97-0022-48bc-8d97002248bc eth0: VF slot 1 added Feb 9 10:24:31.387720 kernel: hv_vmbus: registering driver hv_pci Feb 9 10:24:31.387772 kernel: hv_pci 94627698-6b83-4c3c-8dee-b90139faac3c: PCI VMBus probing: Using version 0x10004 Feb 9 10:24:31.403024 kernel: hv_pci 94627698-6b83-4c3c-8dee-b90139faac3c: PCI host bridge to bus 6b83:00 Feb 9 10:24:31.403170 kernel: pci_bus 6b83:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 10:24:31.409682 kernel: pci_bus 6b83:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 10:24:31.417843 kernel: pci 6b83:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 10:24:31.429674 kernel: pci 6b83:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:24:31.450978 kernel: pci 6b83:00:02.0: enabling Extended Tags Feb 9 10:24:31.469653 kernel: pci 6b83:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 6b83:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 10:24:31.482653 kernel: pci_bus 6b83:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 10:24:31.482801 kernel: pci 6b83:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:24:31.522589 kernel: mlx5_core 6b83:00:02.0: firmware version: 16.30.1284 Feb 9 10:24:31.677623 kernel: mlx5_core 6b83:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 10:24:31.736389 kernel: hv_netvsc 002248bc-8d97-0022-48bc-8d97002248bc eth0: VF registering: eth1 Feb 9 10:24:31.736559 kernel: mlx5_core 6b83:00:02.0 eth1: joined to eth0 Feb 9 10:24:31.748591 kernel: mlx5_core 6b83:00:02.0 enP27523s1: renamed from eth1 Feb 9 10:24:31.775085 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:24:31.819589 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (530) Feb 9 10:24:31.832706 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:24:31.965637 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:24:32.034219 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:24:32.040165 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:24:32.052915 systemd[1]: Starting disk-uuid.service... Feb 9 10:24:32.079611 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:24:32.088595 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:24:33.097961 disk-uuid[604]: The operation has completed successfully. Feb 9 10:24:33.103464 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:24:33.167022 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:24:33.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.167111 systemd[1]: Finished disk-uuid.service. Feb 9 10:24:33.172011 systemd[1]: Starting verity-setup.service... Feb 9 10:24:33.211588 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:24:33.546423 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:24:33.552663 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:24:33.561745 systemd[1]: Finished verity-setup.service. Feb 9 10:24:33.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.617592 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:24:33.617784 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:24:33.621771 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:24:33.622509 systemd[1]: Starting ignition-setup.service... Feb 9 10:24:33.637505 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:24:33.673561 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:24:33.673612 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:24:33.678274 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:24:33.727836 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:24:33.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.736000 audit: BPF prog-id=9 op=LOAD Feb 9 10:24:33.737425 systemd[1]: Starting systemd-networkd.service... Feb 9 10:24:33.766790 systemd-networkd[842]: lo: Link UP Feb 9 10:24:33.770231 systemd-networkd[842]: lo: Gained carrier Feb 9 10:24:33.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.770758 systemd-networkd[842]: Enumeration completed Feb 9 10:24:33.771002 systemd[1]: Started systemd-networkd.service. Feb 9 10:24:33.775274 systemd[1]: Reached target network.target. Feb 9 10:24:33.783543 systemd-networkd[842]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:24:33.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.787631 systemd[1]: Starting iscsiuio.service... Feb 9 10:24:33.796012 systemd[1]: Started iscsiuio.service. Feb 9 10:24:33.822721 iscsid[851]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:24:33.822721 iscsid[851]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 10:24:33.822721 iscsid[851]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Feb 9 10:24:33.822721 iscsid[851]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:24:33.822721 iscsid[851]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:24:33.822721 iscsid[851]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:24:33.822721 iscsid[851]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:24:33.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.804507 systemd[1]: Starting iscsid.service... Feb 9 10:24:33.822048 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:24:33.822394 systemd[1]: Started iscsid.service. Feb 9 10:24:33.827700 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:24:33.883250 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:24:33.894657 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:24:33.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:33.906038 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:24:33.914011 systemd[1]: Reached target remote-fs.target. Feb 9 10:24:33.923214 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:24:33.937407 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:24:33.997593 kernel: mlx5_core 6b83:00:02.0 enP27523s1: Link up Feb 9 10:24:34.039586 kernel: hv_netvsc 002248bc-8d97-0022-48bc-8d97002248bc eth0: Data path switched to VF: enP27523s1 Feb 9 10:24:34.045100 systemd-networkd[842]: enP27523s1: Link UP Feb 9 10:24:34.049760 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:24:34.045181 systemd-networkd[842]: eth0: Link UP Feb 9 10:24:34.045295 systemd-networkd[842]: eth0: Gained carrier Feb 9 10:24:34.053756 systemd-networkd[842]: enP27523s1: Gained carrier Feb 9 10:24:34.072635 systemd-networkd[842]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:24:34.132626 systemd[1]: Finished ignition-setup.service. Feb 9 10:24:34.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:34.163122 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 10:24:34.163167 kernel: audit: type=1130 audit(1707474274.136:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:34.163326 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:24:35.798741 systemd-networkd[842]: eth0: Gained IPv6LL Feb 9 10:24:37.298622 ignition[869]: Ignition 2.14.0 Feb 9 10:24:37.301835 ignition[869]: Stage: fetch-offline Feb 9 10:24:37.301914 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:37.301952 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:37.377606 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:37.377773 ignition[869]: parsed url from cmdline: "" Feb 9 10:24:37.377777 ignition[869]: no config URL provided Feb 9 10:24:37.377783 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:24:37.423370 kernel: audit: type=1130 audit(1707474277.399:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.391226 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:24:37.377792 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:24:37.400710 systemd[1]: Starting ignition-fetch.service... Feb 9 10:24:37.377798 ignition[869]: failed to fetch config: resource requires networking Feb 9 10:24:37.378112 ignition[869]: Ignition finished successfully Feb 9 10:24:37.426972 ignition[875]: Ignition 2.14.0 Feb 9 10:24:37.426979 ignition[875]: Stage: fetch Feb 9 10:24:37.427079 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:37.427100 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:37.436815 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:37.436954 ignition[875]: parsed url from cmdline: "" Feb 9 10:24:37.436958 ignition[875]: no config URL provided Feb 9 10:24:37.436963 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:24:37.436970 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:24:37.436999 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 10:24:37.534060 ignition[875]: GET result: OK Feb 9 10:24:37.534094 ignition[875]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 10:24:37.673282 ignition[875]: opening config device: "/dev/sr0" Feb 9 10:24:37.673715 ignition[875]: getting drive status for "/dev/sr0" Feb 9 10:24:37.673819 ignition[875]: drive status: OK Feb 9 10:24:37.673862 ignition[875]: mounting config device Feb 9 10:24:37.673874 ignition[875]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure28428656" Feb 9 10:24:37.698622 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 10:24:37.698768 ignition[875]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure28428656" Feb 9 10:24:37.698776 ignition[875]: checking for config drive Feb 9 10:24:37.705771 ignition[875]: reading config Feb 9 10:24:37.706140 ignition[875]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure28428656" Feb 9 10:24:37.706725 ignition[875]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure28428656" Feb 9 10:24:37.706423 systemd[1]: tmp-ignition\x2dazure28428656.mount: Deactivated successfully. Feb 9 10:24:37.706737 ignition[875]: config has been read from custom data Feb 9 10:24:37.706826 ignition[875]: parsing config with SHA512: 33f64e2a1de80e49928f114f20a12e3fa88e5a1cc1552ff4d9c54ae47e8cb738697b2b2d249e216cc46085c9798dd26f616317caa18e95c77675956d4ecbd876 Feb 9 10:24:37.751125 unknown[875]: fetched base config from "system" Feb 9 10:24:37.755517 unknown[875]: fetched base config from "system" Feb 9 10:24:37.755524 unknown[875]: fetched user config from "azure" Feb 9 10:24:37.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.756158 ignition[875]: fetch: fetch complete Feb 9 10:24:37.792951 kernel: audit: type=1130 audit(1707474277.764:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.760798 systemd[1]: Finished ignition-fetch.service. Feb 9 10:24:37.756163 ignition[875]: fetch: fetch passed Feb 9 10:24:37.785212 systemd[1]: Starting ignition-kargs.service... Feb 9 10:24:37.756202 ignition[875]: Ignition finished successfully Feb 9 10:24:37.832375 kernel: audit: type=1130 audit(1707474277.810:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.806269 systemd[1]: Finished ignition-kargs.service. Feb 9 10:24:37.796761 ignition[883]: Ignition 2.14.0 Feb 9 10:24:37.811322 systemd[1]: Starting ignition-disks.service... Feb 9 10:24:37.796767 ignition[883]: Stage: kargs Feb 9 10:24:37.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.843047 systemd[1]: Finished ignition-disks.service. Feb 9 10:24:37.882838 kernel: audit: type=1130 audit(1707474277.850:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:37.796866 ignition[883]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:37.868154 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:24:37.796891 ignition[883]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:37.874527 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:24:37.802159 ignition[883]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:37.879626 systemd[1]: Reached target local-fs.target. Feb 9 10:24:37.804304 ignition[883]: kargs: kargs passed Feb 9 10:24:37.886966 systemd[1]: Reached target sysinit.target. Feb 9 10:24:37.804354 ignition[883]: Ignition finished successfully Feb 9 10:24:37.896688 systemd[1]: Reached target basic.target. Feb 9 10:24:37.820618 ignition[889]: Ignition 2.14.0 Feb 9 10:24:37.905712 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:24:37.820624 ignition[889]: Stage: disks Feb 9 10:24:37.820719 ignition[889]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:37.820739 ignition[889]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:37.823202 ignition[889]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:37.839389 ignition[889]: disks: disks passed Feb 9 10:24:37.839444 ignition[889]: Ignition finished successfully Feb 9 10:24:37.969182 systemd-fsck[897]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 10:24:37.972821 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:24:37.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.001550 systemd[1]: Mounting sysroot.mount... Feb 9 10:24:38.008294 kernel: audit: type=1130 audit(1707474277.980:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.032595 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:24:38.032671 systemd[1]: Mounted sysroot.mount. Feb 9 10:24:38.036301 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:24:38.071353 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:24:38.075884 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 10:24:38.083337 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:24:38.083366 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:24:38.089384 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:24:38.121036 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:24:38.125848 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:24:38.148630 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:24:38.155966 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Feb 9 10:24:38.167482 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:24:38.167512 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:24:38.171888 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:24:38.179319 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:24:38.203270 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:24:38.212022 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:24:38.221161 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:24:38.712034 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:24:38.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.736405 systemd[1]: Starting ignition-mount.service... Feb 9 10:24:38.753825 kernel: audit: type=1130 audit(1707474278.716:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.742510 systemd[1]: Starting sysroot-boot.service... Feb 9 10:24:38.758177 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 10:24:38.758274 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 10:24:38.790045 ignition[974]: INFO : Ignition 2.14.0 Feb 9 10:24:38.790352 systemd[1]: Finished sysroot-boot.service. Feb 9 10:24:38.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.816106 ignition[974]: INFO : Stage: mount Feb 9 10:24:38.816106 ignition[974]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:38.816106 ignition[974]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:38.863760 kernel: audit: type=1130 audit(1707474278.798:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.863788 kernel: audit: type=1130 audit(1707474278.833:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:38.829958 systemd[1]: Finished ignition-mount.service. Feb 9 10:24:38.867806 ignition[974]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:38.867806 ignition[974]: INFO : mount: mount passed Feb 9 10:24:38.867806 ignition[974]: INFO : Ignition finished successfully Feb 9 10:24:39.995834 coreos-metadata[906]: Feb 09 10:24:39.995 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 10:24:40.004665 coreos-metadata[906]: Feb 09 10:24:39.999 INFO Fetch successful Feb 9 10:24:40.035972 coreos-metadata[906]: Feb 09 10:24:40.035 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 10:24:40.047666 coreos-metadata[906]: Feb 09 10:24:40.046 INFO Fetch successful Feb 9 10:24:40.062370 coreos-metadata[906]: Feb 09 10:24:40.062 INFO wrote hostname ci-3510.3.2-a-a099f8e901 to /sysroot/etc/hostname Feb 9 10:24:40.070741 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 10:24:40.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:40.076867 systemd[1]: Starting ignition-files.service... Feb 9 10:24:40.102050 kernel: audit: type=1130 audit(1707474280.075:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:40.108448 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:24:40.133606 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Feb 9 10:24:40.133657 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:24:40.138275 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:24:40.143896 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:24:40.147936 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:24:40.163716 ignition[1004]: INFO : Ignition 2.14.0 Feb 9 10:24:40.163716 ignition[1004]: INFO : Stage: files Feb 9 10:24:40.174336 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:40.174336 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:40.174336 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:40.174336 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:24:40.206544 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:24:40.206544 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:24:40.312713 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:24:40.320270 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:24:40.331707 unknown[1004]: wrote ssh authorized keys file for user: core Feb 9 10:24:40.337436 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:24:40.345583 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:24:40.345583 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:24:40.830252 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:24:40.986177 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:24:41.002027 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:24:41.002027 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:24:41.002027 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 10:24:41.296093 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:24:41.700107 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:24:41.700107 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:24:41.721769 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:24:42.092799 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:24:42.291828 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:24:42.308212 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:24:42.308212 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:24:42.308212 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 10:24:42.471593 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:24:42.803937 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 10:24:42.820286 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:24:42.820286 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:24:42.820286 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:24:42.856620 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 10:24:43.130772 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:24:43.147940 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:24:43.147940 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:24:43.147940 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:24:43.182673 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 10:24:43.884536 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:24:43.906656 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:24:44.141639 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1007) Feb 9 10:24:44.141672 kernel: audit: type=1130 audit(1707474284.018:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.141684 kernel: audit: type=1130 audit(1707474284.087:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.141694 kernel: audit: type=1131 audit(1707474284.087:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736035488" Feb 9 10:24:44.141794 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736035488": device or resource busy Feb 9 10:24:44.141794 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem736035488", trying btrfs: device or resource busy Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736035488" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem736035488" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem736035488" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem736035488" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2431778274" Feb 9 10:24:44.141794 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2431778274": device or resource busy Feb 9 10:24:44.141794 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2431778274", trying btrfs: device or resource busy Feb 9 10:24:44.141794 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2431778274" Feb 9 10:24:43.981298 systemd[1]: mnt-oem736035488.mount: Deactivated successfully. Feb 9 10:24:44.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.321153 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2431778274" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2431778274" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2431778274" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:24:44.321153 ignition[1004]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:24:44.578188 kernel: audit: type=1130 audit(1707474284.300:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.578213 kernel: audit: type=1130 audit(1707474284.395:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.578229 kernel: audit: type=1131 audit(1707474284.419:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.578240 kernel: audit: type=1130 audit(1707474284.508:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:43.997617 systemd[1]: mnt-oem2431778274.mount: Deactivated successfully. Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:24:44.587221 ignition[1004]: INFO : files: files passed Feb 9 10:24:44.587221 ignition[1004]: INFO : Ignition finished successfully Feb 9 10:24:44.773643 kernel: audit: type=1131 audit(1707474284.613:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.773715 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:24:44.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.007458 systemd[1]: Finished ignition-files.service. Feb 9 10:24:44.045440 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:24:44.050420 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:24:44.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.051172 systemd[1]: Starting ignition-quench.service... Feb 9 10:24:44.838276 kernel: audit: type=1131 audit(1707474284.777:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.074017 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:24:44.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.074116 systemd[1]: Finished ignition-quench.service. Feb 9 10:24:44.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.285136 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:24:44.323522 systemd[1]: Reached target ignition-complete.target. Feb 9 10:24:44.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.347066 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:24:44.385458 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:24:44.889857 ignition[1042]: INFO : Ignition 2.14.0 Feb 9 10:24:44.889857 ignition[1042]: INFO : Stage: umount Feb 9 10:24:44.889857 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:24:44.889857 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:24:44.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.385591 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:24:44.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.946757 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:24:44.946757 ignition[1042]: INFO : umount: umount passed Feb 9 10:24:44.946757 ignition[1042]: INFO : Ignition finished successfully Feb 9 10:24:44.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.420177 systemd[1]: Reached target initrd-fs.target. Feb 9 10:24:44.431821 systemd[1]: Reached target initrd.target. Feb 9 10:24:44.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.462188 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:24:44.473463 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:24:44.504167 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:24:44.561994 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:24:44.575288 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:24:44.582488 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:24:44.592242 systemd[1]: Stopped target timers.target. Feb 9 10:24:44.602764 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:24:44.602912 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:24:44.638145 systemd[1]: Stopped target initrd.target. Feb 9 10:24:45.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.649100 systemd[1]: Stopped target basic.target. Feb 9 10:24:44.660354 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:24:44.672888 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:24:45.106155 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:24:45.106188 kernel: audit: type=1131 audit(1707474285.078:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.685387 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:24:45.130691 kernel: audit: type=1130 audit(1707474285.110:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.697585 systemd[1]: Stopped target remote-fs.target. Feb 9 10:24:45.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.709397 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:24:45.180550 kernel: audit: type=1131 audit(1707474285.110:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.180587 kernel: audit: type=1131 audit(1707474285.135:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.721652 systemd[1]: Stopped target sysinit.target. Feb 9 10:24:44.733517 systemd[1]: Stopped target local-fs.target. Feb 9 10:24:45.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.746713 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:24:45.243702 kernel: audit: type=1131 audit(1707474285.160:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.243725 kernel: audit: type=1334 audit(1707474285.160:65): prog-id=6 op=UNLOAD Feb 9 10:24:45.243735 kernel: audit: type=1131 audit(1707474285.192:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.160000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:24:45.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.760642 systemd[1]: Stopped target swap.target. Feb 9 10:24:44.769189 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:24:45.284404 kernel: audit: type=1131 audit(1707474285.256:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.769353 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:24:45.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.802370 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:24:44.810342 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:24:45.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.810476 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:24:45.342053 kernel: audit: type=1131 audit(1707474285.284:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.342073 kernel: audit: type=1131 audit(1707474285.313:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.819521 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:24:44.819668 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:24:45.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.834527 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:24:44.834666 systemd[1]: Stopped ignition-files.service. Feb 9 10:24:44.842553 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 10:24:44.842693 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 10:24:45.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.855794 systemd[1]: Stopping ignition-mount.service... Feb 9 10:24:45.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.866527 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:24:45.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.866727 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:24:45.429314 kernel: hv_netvsc 002248bc-8d97-0022-48bc-8d97002248bc eth0: Data path switched from VF: enP27523s1 Feb 9 10:24:44.872135 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:24:44.879507 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:24:44.881460 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:24:45.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.904078 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:24:45.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:45.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.904217 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:24:44.919279 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:24:44.931753 systemd[1]: Stopped ignition-mount.service. Feb 9 10:24:44.938023 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:24:44.938078 systemd[1]: Stopped ignition-disks.service. Feb 9 10:24:44.943684 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:24:44.943729 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:24:44.957367 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 10:24:44.957403 systemd[1]: Stopped ignition-fetch.service. Feb 9 10:24:44.965538 systemd[1]: Stopped target network.target. Feb 9 10:24:44.974183 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:24:45.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:44.974225 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:24:44.982518 systemd[1]: Stopped target paths.target. Feb 9 10:24:44.998768 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:24:45.008611 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:24:45.015487 systemd[1]: Stopped target slices.target. Feb 9 10:24:45.023276 systemd[1]: Stopped target sockets.target. Feb 9 10:24:45.031498 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:24:45.559519 iscsid[851]: iscsid shutting down. Feb 9 10:24:45.559611 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 10:24:45.031526 systemd[1]: Closed iscsid.socket. Feb 9 10:24:45.038492 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:24:45.038514 systemd[1]: Closed iscsiuio.socket. Feb 9 10:24:45.047083 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:24:45.047120 systemd[1]: Stopped ignition-setup.service. Feb 9 10:24:45.055124 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:24:45.062382 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:24:45.069423 systemd-networkd[842]: eth0: DHCPv6 lease lost Feb 9 10:24:45.559000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:24:45.071402 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:24:45.071876 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:24:45.071966 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:24:45.079606 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:24:45.079678 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:24:45.110553 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:24:45.110666 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:24:45.135698 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:24:45.135782 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:24:45.160971 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:24:45.161017 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:24:45.184591 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:24:45.184639 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:24:45.211285 systemd[1]: Stopping network-cleanup.service... Feb 9 10:24:45.223112 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:24:45.223180 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:24:45.257075 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:24:45.257132 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:24:45.304756 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:24:45.304810 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:24:45.338372 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:24:45.347471 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:24:45.347996 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:24:45.348119 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:24:45.361688 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:24:45.361739 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:24:45.372711 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:24:45.372754 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:24:45.381797 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:24:45.381854 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:24:45.391837 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:24:45.391881 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:24:45.400804 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:24:45.400840 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:24:45.424655 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:24:45.437853 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:24:45.437919 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:24:45.448300 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:24:45.448408 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:24:45.502036 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:24:45.502142 systemd[1]: Stopped network-cleanup.service. Feb 9 10:24:45.510079 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:24:45.521700 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:24:45.536680 systemd[1]: Switching root. Feb 9 10:24:45.560970 systemd-journald[276]: Journal stopped Feb 9 10:24:59.520860 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:24:59.520881 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:24:59.520893 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:24:59.520903 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:24:59.520912 kernel: SELinux: policy capability open_perms=1 Feb 9 10:24:59.520922 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:24:59.520931 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:24:59.520940 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:24:59.520948 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:24:59.520956 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:24:59.520965 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:24:59.520975 systemd[1]: Successfully loaded SELinux policy in 242.309ms. Feb 9 10:24:59.520986 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.949ms. Feb 9 10:24:59.520997 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:24:59.521009 systemd[1]: Detected virtualization microsoft. Feb 9 10:24:59.521018 systemd[1]: Detected architecture arm64. Feb 9 10:24:59.521027 systemd[1]: Detected first boot. Feb 9 10:24:59.521037 systemd[1]: Hostname set to <ci-3510.3.2-a-a099f8e901>. Feb 9 10:24:59.521048 systemd[1]: Initializing machine ID from random generator. Feb 9 10:24:59.521057 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:24:59.521065 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 9 10:24:59.521075 kernel: audit: type=1400 audit(1707474291.158:86): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:24:59.521088 kernel: audit: type=1300 audit(1707474291.158:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:24:59.521098 kernel: audit: type=1327 audit(1707474291.158:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:24:59.521108 kernel: audit: type=1400 audit(1707474291.168:87): avc: denied { associate } for pid=1076 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:24:59.521118 kernel: audit: type=1300 audit(1707474291.168:87): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:24:59.521127 kernel: audit: type=1307 audit(1707474291.168:87): cwd="/" Feb 9 10:24:59.521137 kernel: audit: type=1302 audit(1707474291.168:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:24:59.521147 kernel: audit: type=1302 audit(1707474291.168:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:24:59.521156 kernel: audit: type=1327 audit(1707474291.168:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:24:59.521166 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:24:59.521176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:24:59.521186 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:24:59.521197 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:24:59.521207 kernel: audit: type=1334 audit(1707474298.783:88): prog-id=12 op=LOAD Feb 9 10:24:59.521216 kernel: audit: type=1334 audit(1707474298.783:89): prog-id=3 op=UNLOAD Feb 9 10:24:59.521225 kernel: audit: type=1334 audit(1707474298.789:90): prog-id=13 op=LOAD Feb 9 10:24:59.521234 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:24:59.521243 kernel: audit: type=1334 audit(1707474298.795:91): prog-id=14 op=LOAD Feb 9 10:24:59.521252 systemd[1]: Stopped iscsiuio.service. Feb 9 10:24:59.521264 kernel: audit: type=1334 audit(1707474298.795:92): prog-id=4 op=UNLOAD Feb 9 10:24:59.521274 kernel: audit: type=1334 audit(1707474298.795:93): prog-id=5 op=UNLOAD Feb 9 10:24:59.521283 kernel: audit: type=1131 audit(1707474298.797:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.521293 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:24:59.521302 kernel: audit: type=1334 audit(1707474298.818:95): prog-id=12 op=UNLOAD Feb 9 10:24:59.521311 systemd[1]: Stopped iscsid.service. Feb 9 10:24:59.521321 kernel: audit: type=1131 audit(1707474298.846:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.521331 kernel: audit: type=1131 audit(1707474298.884:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.521342 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:24:59.521352 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:24:59.521362 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:24:59.521371 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:24:59.521381 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:24:59.521391 systemd[1]: Created slice system-getty.slice. Feb 9 10:24:59.521400 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:24:59.521410 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:24:59.521421 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:24:59.521432 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:24:59.521442 systemd[1]: Created slice user.slice. Feb 9 10:24:59.521451 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:24:59.521461 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:24:59.521471 systemd[1]: Set up automount boot.automount. Feb 9 10:24:59.521481 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:24:59.521491 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:24:59.521500 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:24:59.521511 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:24:59.521521 systemd[1]: Reached target integritysetup.target. Feb 9 10:24:59.521530 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:24:59.521540 systemd[1]: Reached target remote-fs.target. Feb 9 10:24:59.521550 systemd[1]: Reached target slices.target. Feb 9 10:24:59.521559 systemd[1]: Reached target swap.target. Feb 9 10:24:59.521577 systemd[1]: Reached target torcx.target. Feb 9 10:24:59.521589 systemd[1]: Reached target veritysetup.target. Feb 9 10:24:59.521599 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:24:59.521609 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:24:59.521619 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:24:59.521629 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:24:59.521639 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:24:59.521650 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:24:59.521660 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:24:59.521670 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:24:59.521680 systemd[1]: Mounting media.mount... Feb 9 10:24:59.521689 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:24:59.521699 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:24:59.521709 systemd[1]: Mounting tmp.mount... Feb 9 10:24:59.521719 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:24:59.521729 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:24:59.521740 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:24:59.521750 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:24:59.521760 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:24:59.521770 systemd[1]: Starting modprobe@drm.service... Feb 9 10:24:59.521780 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:24:59.521790 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:24:59.521799 systemd[1]: Starting modprobe@loop.service... Feb 9 10:24:59.521809 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:24:59.521820 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:24:59.521831 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:24:59.521841 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:24:59.521852 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:24:59.521861 systemd[1]: Stopped systemd-journald.service. Feb 9 10:24:59.521873 systemd[1]: systemd-journald.service: Consumed 3.208s CPU time. Feb 9 10:24:59.521883 systemd[1]: Starting systemd-journald.service... Feb 9 10:24:59.521892 kernel: loop: module loaded Feb 9 10:24:59.521902 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:24:59.521911 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:24:59.521922 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:24:59.521932 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:24:59.521942 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:24:59.521952 systemd[1]: Stopped verity-setup.service. Feb 9 10:24:59.521962 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:24:59.521971 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:24:59.521981 systemd[1]: Mounted media.mount. Feb 9 10:24:59.521991 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:24:59.522000 kernel: fuse: init (API version 7.34) Feb 9 10:24:59.522011 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:24:59.522020 systemd[1]: Mounted tmp.mount. Feb 9 10:24:59.522030 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:24:59.522043 systemd-journald[1182]: Journal started Feb 9 10:24:59.522086 systemd-journald[1182]: Runtime Journal (/run/log/journal/bf56737142e94c8f8fbb491d511d5168) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:24:48.730000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:24:49.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:24:49.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:24:49.546000 audit: BPF prog-id=10 op=LOAD Feb 9 10:24:49.546000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:24:49.546000 audit: BPF prog-id=11 op=LOAD Feb 9 10:24:49.546000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:24:51.158000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:24:51.158000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:24:51.158000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:24:51.168000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:24:51.168000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:24:51.168000 audit: CWD cwd="/" Feb 9 10:24:51.168000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:24:51.168000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:24:51.168000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:24:58.783000 audit: BPF prog-id=12 op=LOAD Feb 9 10:24:58.783000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:24:58.789000 audit: BPF prog-id=13 op=LOAD Feb 9 10:24:58.795000 audit: BPF prog-id=14 op=LOAD Feb 9 10:24:58.795000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:24:58.795000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:24:58.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:58.818000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:24:58.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:58.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:58.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:58.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.388000 audit: BPF prog-id=15 op=LOAD Feb 9 10:24:59.388000 audit: BPF prog-id=16 op=LOAD Feb 9 10:24:59.388000 audit: BPF prog-id=17 op=LOAD Feb 9 10:24:59.388000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:24:59.388000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:24:59.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.518000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:24:59.518000 audit[1182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffdebfd270 a2=4000 a3=1 items=0 ppid=1 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:24:59.518000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:24:59.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:51.094919 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:24:58.781864 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:24:51.118995 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:24:58.797469 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:24:51.119014 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:24:58.797829 systemd[1]: systemd-journald.service: Consumed 3.208s CPU time. Feb 9 10:24:51.119052 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:24:51.119062 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:24:51.119092 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:24:51.119104 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:24:51.119296 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:24:51.119328 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:24:51.119340 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:24:51.119730 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:24:51.119782 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:24:51.119802 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:24:51.119816 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:24:51.119834 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:24:51.119857 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:51Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:24:57.695941 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:24:57.696211 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:24:57.696315 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:24:57.696467 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:24:57.696516 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:24:57.696584 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-02-09T10:24:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:24:59.531470 systemd[1]: Started systemd-journald.service. Feb 9 10:24:59.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.532307 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:24:59.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.536978 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:24:59.537098 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:24:59.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.541942 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:24:59.542059 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:24:59.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.546894 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:24:59.547029 systemd[1]: Finished modprobe@drm.service. Feb 9 10:24:59.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.551368 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:24:59.551486 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:24:59.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.556257 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:24:59.556376 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:24:59.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.561889 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:24:59.562017 systemd[1]: Finished modprobe@loop.service. Feb 9 10:24:59.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.566743 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:24:59.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.572151 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:24:59.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.577332 systemd[1]: Reached target network-pre.target. Feb 9 10:24:59.582901 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:24:59.588264 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:24:59.592771 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:24:59.623456 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:24:59.628658 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:24:59.632934 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:24:59.633952 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:24:59.638149 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:24:59.639204 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:24:59.644854 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:24:59.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.649743 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:24:59.654556 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:24:59.659823 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:24:59.667286 udevadm[1194]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:24:59.686263 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:24:59.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.692434 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:24:59.701240 systemd-journald[1182]: Time spent on flushing to /var/log/journal/bf56737142e94c8f8fbb491d511d5168 is 15.057ms for 1146 entries. Feb 9 10:24:59.701240 systemd-journald[1182]: System Journal (/var/log/journal/bf56737142e94c8f8fbb491d511d5168) is 8.0M, max 2.6G, 2.6G free. Feb 9 10:24:59.789310 systemd-journald[1182]: Received client request to flush runtime journal. Feb 9 10:24:59.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.715066 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:24:59.719970 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:24:59.790270 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:24:59.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:24:59.850326 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:24:59.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:00.456704 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:25:00.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:01.041535 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:25:01.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:01.046000 audit: BPF prog-id=18 op=LOAD Feb 9 10:25:01.046000 audit: BPF prog-id=19 op=LOAD Feb 9 10:25:01.046000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:25:01.046000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:25:01.047729 systemd[1]: Starting systemd-udevd.service... Feb 9 10:25:01.065537 systemd-udevd[1199]: Using default interface naming scheme 'v252'. Feb 9 10:25:01.308543 systemd[1]: Started systemd-udevd.service. Feb 9 10:25:01.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:01.318000 audit: BPF prog-id=20 op=LOAD Feb 9 10:25:01.319534 systemd[1]: Starting systemd-networkd.service... Feb 9 10:25:01.345330 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:25:01.446000 audit: BPF prog-id=21 op=LOAD Feb 9 10:25:01.446000 audit: BPF prog-id=22 op=LOAD Feb 9 10:25:01.446000 audit: BPF prog-id=23 op=LOAD Feb 9 10:25:01.447714 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:25:01.476601 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 10:25:01.482000 audit[1214]: AVC avc: denied { confidentiality } for pid=1214 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 10:25:01.497712 kernel: hv_vmbus: registering driver hv_balloon Feb 9 10:25:01.497791 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 10:25:01.497817 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 10:25:01.505651 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 10:25:01.506596 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 10:25:01.514870 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 10:25:01.514937 kernel: Console: switching to colour dummy device 80x25 Feb 9 10:25:01.522210 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:25:01.482000 audit[1214]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a3111c0 a1=aa2c a2=ffffa55924b0 a3=aaab0a26c010 items=12 ppid=1199 pid=1214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:25:01.482000 audit: CWD cwd="/" Feb 9 10:25:01.482000 audit: PATH item=0 name=(null) inode=5816 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=1 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=2 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=3 name=(null) inode=9841 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=4 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=5 name=(null) inode=9842 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=6 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=7 name=(null) inode=9843 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=8 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=9 name=(null) inode=9844 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=10 name=(null) inode=9840 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PATH item=11 name=(null) inode=9845 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:25:01.482000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 10:25:01.536529 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 10:25:01.536624 kernel: hv_vmbus: registering driver hv_utils Feb 9 10:25:01.543259 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 10:25:01.543422 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 10:25:01.543448 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 10:25:02.001628 systemd[1]: Started systemd-userdbd.service. Feb 9 10:25:02.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:02.201334 systemd-networkd[1220]: lo: Link UP Feb 9 10:25:02.201605 systemd-networkd[1220]: lo: Gained carrier Feb 9 10:25:02.202095 systemd-networkd[1220]: Enumeration completed Feb 9 10:25:02.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:02.202264 systemd[1]: Started systemd-networkd.service. Feb 9 10:25:02.208129 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:25:02.253891 systemd-networkd[1220]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:25:02.302748 kernel: mlx5_core 6b83:00:02.0 enP27523s1: Link up Feb 9 10:25:02.318941 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1209) Feb 9 10:25:02.329733 kernel: hv_netvsc 002248bc-8d97-0022-48bc-8d97002248bc eth0: Data path switched to VF: enP27523s1 Feb 9 10:25:02.330867 systemd-networkd[1220]: enP27523s1: Link UP Feb 9 10:25:02.330957 systemd-networkd[1220]: eth0: Link UP Feb 9 10:25:02.330960 systemd-networkd[1220]: eth0: Gained carrier Feb 9 10:25:02.334249 systemd-networkd[1220]: enP27523s1: Gained carrier Feb 9 10:25:02.337170 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:25:02.342850 systemd-networkd[1220]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:25:02.350028 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:25:02.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:02.356197 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:25:02.723045 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:25:02.761710 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:25:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:02.767116 systemd[1]: Reached target cryptsetup.target. Feb 9 10:25:02.772536 systemd[1]: Starting lvm2-activation.service... Feb 9 10:25:02.776513 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:25:02.800560 systemd[1]: Finished lvm2-activation.service. Feb 9 10:25:02.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:02.805323 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:25:02.809780 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:25:02.809807 systemd[1]: Reached target local-fs.target. Feb 9 10:25:02.814085 systemd[1]: Reached target machines.target. Feb 9 10:25:02.819424 systemd[1]: Starting ldconfig.service... Feb 9 10:25:02.823121 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:25:02.823189 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:25:02.824217 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:25:02.829208 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:25:02.836043 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:25:02.840662 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:25:02.840728 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:25:02.841678 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:25:02.866402 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1279 (bootctl) Feb 9 10:25:02.867488 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:25:03.316375 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:25:03.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:03.656452 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:25:03.669090 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:25:03.669832 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:25:03.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:03.732979 systemd-fsck[1287]: fsck.fat 4.2 (2021-01-31) Feb 9 10:25:03.732979 systemd-fsck[1287]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 10:25:03.734838 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:25:03.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:03.742348 systemd[1]: Mounting boot.mount... Feb 9 10:25:03.755453 systemd[1]: Mounted boot.mount. Feb 9 10:25:03.769712 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:25:03.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:03.789614 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:25:03.925552 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:25:04.344816 systemd-networkd[1220]: eth0: Gained IPv6LL Feb 9 10:25:04.350533 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:25:04.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.360170 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 10:25:04.360227 kernel: audit: type=1130 audit(1707474304.355:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.467476 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:25:04.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.489703 kernel: audit: type=1130 audit(1707474304.471:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.490334 systemd[1]: Starting audit-rules.service... Feb 9 10:25:04.495284 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:25:04.500534 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:25:04.505000 audit: BPF prog-id=24 op=LOAD Feb 9 10:25:04.507039 systemd[1]: Starting systemd-resolved.service... Feb 9 10:25:04.516750 kernel: audit: type=1334 audit(1707474304.505:156): prog-id=24 op=LOAD Feb 9 10:25:04.516000 audit: BPF prog-id=25 op=LOAD Feb 9 10:25:04.518091 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:25:04.522702 kernel: audit: type=1334 audit(1707474304.516:157): prog-id=25 op=LOAD Feb 9 10:25:04.527419 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:25:04.566000 audit[1299]: SYSTEM_BOOT pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.575364 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:25:04.590121 kernel: audit: type=1127 audit(1707474304.566:158): pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.591942 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:25:04.613147 kernel: audit: type=1130 audit(1707474304.589:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.613488 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:25:04.631700 kernel: audit: type=1130 audit(1707474304.612:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.638157 systemd[1]: Reached target time-set.target. Feb 9 10:25:04.642408 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:25:04.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.660719 kernel: audit: type=1130 audit(1707474304.637:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.671863 systemd-resolved[1296]: Positive Trust Anchors: Feb 9 10:25:04.672118 systemd-resolved[1296]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:25:04.672199 systemd-resolved[1296]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:25:04.677874 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:25:04.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.703718 kernel: audit: type=1130 audit(1707474304.682:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.754482 systemd-resolved[1296]: Using system hostname 'ci-3510.3.2-a-a099f8e901'. Feb 9 10:25:04.756013 systemd[1]: Started systemd-resolved.service. Feb 9 10:25:04.760852 systemd[1]: Reached target network.target. Feb 9 10:25:04.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.780540 systemd[1]: Reached target network-online.target. Feb 9 10:25:04.786020 kernel: audit: type=1130 audit(1707474304.760:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:25:04.786615 systemd[1]: Reached target nss-lookup.target. Feb 9 10:25:04.986865 systemd-timesyncd[1298]: Contacted time server 5.161.111.190:123 (0.flatcar.pool.ntp.org). Feb 9 10:25:04.986933 systemd-timesyncd[1298]: Initial clock synchronization to Fri 2024-02-09 10:25:04.990924 UTC. Feb 9 10:25:05.027000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:25:05.027000 audit[1314]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdcceb350 a2=420 a3=0 items=0 ppid=1293 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:25:05.027000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:25:05.052121 augenrules[1314]: No rules Feb 9 10:25:05.052831 systemd[1]: Finished audit-rules.service. Feb 9 10:25:12.129378 ldconfig[1278]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:25:12.139000 systemd[1]: Finished ldconfig.service. Feb 9 10:25:12.144780 systemd[1]: Starting systemd-update-done.service... Feb 9 10:25:12.173658 systemd[1]: Finished systemd-update-done.service. Feb 9 10:25:12.178353 systemd[1]: Reached target sysinit.target. Feb 9 10:25:12.182602 systemd[1]: Started motdgen.path. Feb 9 10:25:12.186500 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:25:12.192487 systemd[1]: Started logrotate.timer. Feb 9 10:25:12.196263 systemd[1]: Started mdadm.timer. Feb 9 10:25:12.200012 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:25:12.204467 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:25:12.204496 systemd[1]: Reached target paths.target. Feb 9 10:25:12.208552 systemd[1]: Reached target timers.target. Feb 9 10:25:12.213035 systemd[1]: Listening on dbus.socket. Feb 9 10:25:12.217825 systemd[1]: Starting docker.socket... Feb 9 10:25:12.225369 systemd[1]: Listening on sshd.socket. Feb 9 10:25:12.229233 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:25:12.229643 systemd[1]: Listening on docker.socket. Feb 9 10:25:12.233676 systemd[1]: Reached target sockets.target. Feb 9 10:25:12.237705 systemd[1]: Reached target basic.target. Feb 9 10:25:12.241706 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:25:12.241731 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:25:12.242671 systemd[1]: Starting containerd.service... Feb 9 10:25:12.247086 systemd[1]: Starting dbus.service... Feb 9 10:25:12.251030 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:25:12.256084 systemd[1]: Starting extend-filesystems.service... Feb 9 10:25:12.262871 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:25:12.263898 systemd[1]: Starting motdgen.service... Feb 9 10:25:12.268297 systemd[1]: Started nvidia.service. Feb 9 10:25:12.273189 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:25:12.278054 systemd[1]: Starting prepare-critools.service... Feb 9 10:25:12.283034 systemd[1]: Starting prepare-helm.service... Feb 9 10:25:12.287709 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:25:12.293577 systemd[1]: Starting sshd-keygen.service... Feb 9 10:25:12.299397 systemd[1]: Starting systemd-logind.service... Feb 9 10:25:12.303326 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:25:12.303383 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:25:12.303752 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:25:12.304340 systemd[1]: Starting update-engine.service... Feb 9 10:25:12.309329 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:25:12.318257 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:25:12.318429 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:25:12.354582 extend-filesystems[1325]: Found sda Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda1 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda2 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda3 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found usr Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda4 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda6 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda7 Feb 9 10:25:12.358538 extend-filesystems[1325]: Found sda9 Feb 9 10:25:12.358538 extend-filesystems[1325]: Checking size of /dev/sda9 Feb 9 10:25:12.409794 jq[1343]: true Feb 9 10:25:12.409889 jq[1324]: false Feb 9 10:25:12.372162 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:25:12.372358 systemd[1]: Finished motdgen.service. Feb 9 10:25:12.402117 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:25:12.402285 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:25:12.416450 env[1350]: time="2024-02-09T10:25:12.416408856Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:25:12.429834 jq[1363]: true Feb 9 10:25:12.438867 env[1350]: time="2024-02-09T10:25:12.438833173Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:25:12.439270 env[1350]: time="2024-02-09T10:25:12.439246241Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.440316 env[1350]: time="2024-02-09T10:25:12.440285053Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:25:12.440420 env[1350]: time="2024-02-09T10:25:12.440405353Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.441648 env[1350]: time="2024-02-09T10:25:12.440641352Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:25:12.441783 env[1350]: time="2024-02-09T10:25:12.441764938Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.441855 env[1350]: time="2024-02-09T10:25:12.441840591Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:25:12.441907 env[1350]: time="2024-02-09T10:25:12.441895080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.442048 env[1350]: time="2024-02-09T10:25:12.442028822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.442367 env[1350]: time="2024-02-09T10:25:12.442315510Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:25:12.443274 systemd-logind[1338]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 9 10:25:12.444975 systemd-logind[1338]: New seat seat0. Feb 9 10:25:12.451759 extend-filesystems[1325]: Old size kept for /dev/sda9 Feb 9 10:25:12.451759 extend-filesystems[1325]: Found sr0 Feb 9 10:25:12.469563 env[1350]: time="2024-02-09T10:25:12.465442822Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:25:12.469563 env[1350]: time="2024-02-09T10:25:12.465471787Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:25:12.469563 env[1350]: time="2024-02-09T10:25:12.465544279Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:25:12.469563 env[1350]: time="2024-02-09T10:25:12.465558842Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:25:12.456347 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:25:12.456507 systemd[1]: Finished extend-filesystems.service. Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488763367Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488803494Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488818616Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488859863Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488875306Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488890628Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.488902990Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489245487Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489263770Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489277012Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489289574Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489303137Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489424397Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:25:12.490724 env[1350]: time="2024-02-09T10:25:12.489494808Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489754412Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489779416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489792338Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489841106Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489855468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489867150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489879272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489891434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489903356Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489914638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489925760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.489940362Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.490055101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.490070584Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491063 env[1350]: time="2024-02-09T10:25:12.490084786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491351 env[1350]: time="2024-02-09T10:25:12.490096228Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:25:12.491351 env[1350]: time="2024-02-09T10:25:12.490110991Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:25:12.491351 env[1350]: time="2024-02-09T10:25:12.490121872Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:25:12.491351 env[1350]: time="2024-02-09T10:25:12.490141276Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:25:12.491351 env[1350]: time="2024-02-09T10:25:12.490178802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:25:12.491449 env[1350]: time="2024-02-09T10:25:12.490372634Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:25:12.491449 env[1350]: time="2024-02-09T10:25:12.490424163Z" level=info msg="Connect containerd service" Feb 9 10:25:12.491449 env[1350]: time="2024-02-09T10:25:12.490452367Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496545537Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496666277Z" level=info msg="Start subscribing containerd event" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496720846Z" level=info msg="Start recovering state" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496777415Z" level=info msg="Start event monitor" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496793458Z" level=info msg="Start snapshots syncer" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496802380Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.496809781Z" level=info msg="Start streaming server" Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.497129954Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.497304103Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:25:12.523957 env[1350]: time="2024-02-09T10:25:12.504052261Z" level=info msg="containerd successfully booted in 0.088284s" Feb 9 10:25:12.497424 systemd[1]: Started containerd.service. Feb 9 10:25:12.548321 tar[1345]: ./ Feb 9 10:25:12.548321 tar[1345]: ./macvlan Feb 9 10:25:12.551475 tar[1347]: linux-arm64/helm Feb 9 10:25:12.554745 tar[1346]: crictl Feb 9 10:25:12.635301 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 10:25:12.651953 tar[1345]: ./static Feb 9 10:25:12.652082 bash[1391]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:25:12.652770 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:25:12.705886 tar[1345]: ./vlan Feb 9 10:25:12.723651 dbus-daemon[1323]: [system] SELinux support is enabled Feb 9 10:25:12.723827 systemd[1]: Started dbus.service. Feb 9 10:25:12.729120 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:25:12.729141 systemd[1]: Reached target system-config.target. Feb 9 10:25:12.737783 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:25:12.737803 systemd[1]: Reached target user-config.target. Feb 9 10:25:12.745055 systemd[1]: Started systemd-logind.service. Feb 9 10:25:12.796504 tar[1345]: ./portmap Feb 9 10:25:12.866620 tar[1345]: ./host-local Feb 9 10:25:12.925889 tar[1345]: ./vrf Feb 9 10:25:12.985068 tar[1345]: ./bridge Feb 9 10:25:13.057991 tar[1345]: ./tuning Feb 9 10:25:13.095444 tar[1345]: ./firewall Feb 9 10:25:13.161140 tar[1345]: ./host-device Feb 9 10:25:13.228168 tar[1345]: ./sbr Feb 9 10:25:13.260793 tar[1345]: ./loopback Feb 9 10:25:13.266317 update_engine[1340]: I0209 10:25:13.252893 1340 main.cc:92] Flatcar Update Engine starting Feb 9 10:25:13.313735 tar[1345]: ./dhcp Feb 9 10:25:13.326663 systemd[1]: Started update-engine.service. Feb 9 10:25:13.337020 update_engine[1340]: I0209 10:25:13.326709 1340 update_check_scheduler.cc:74] Next update check in 10m0s Feb 9 10:25:13.332789 systemd[1]: Started locksmithd.service. Feb 9 10:25:13.388578 tar[1347]: linux-arm64/LICENSE Feb 9 10:25:13.388676 tar[1347]: linux-arm64/README.md Feb 9 10:25:13.392933 systemd[1]: Finished prepare-critools.service. Feb 9 10:25:13.403259 systemd[1]: Finished prepare-helm.service. Feb 9 10:25:13.436059 tar[1345]: ./ptp Feb 9 10:25:13.467986 tar[1345]: ./ipvlan Feb 9 10:25:13.499322 tar[1345]: ./bandwidth Feb 9 10:25:13.565484 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:25:14.979862 locksmithd[1427]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:25:17.842207 sshd_keygen[1342]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:25:17.859084 systemd[1]: Finished sshd-keygen.service. Feb 9 10:25:17.865607 systemd[1]: Starting issuegen.service... Feb 9 10:25:17.870224 systemd[1]: Started waagent.service. Feb 9 10:25:17.874664 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:25:17.874897 systemd[1]: Finished issuegen.service. Feb 9 10:25:17.880180 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:25:17.914524 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:25:17.920974 systemd[1]: Started getty@tty1.service. Feb 9 10:25:17.926431 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:25:17.931362 systemd[1]: Reached target getty.target. Feb 9 10:25:17.935887 systemd[1]: Reached target multi-user.target. Feb 9 10:25:17.941665 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:25:17.950090 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:25:17.950274 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:25:17.956829 systemd[1]: Startup finished in 718ms (kernel) + 18.629s (initrd) + 29.239s (userspace) = 48.587s. Feb 9 10:25:19.171773 login[1450]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 10:25:19.172287 login[1449]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:25:19.222447 systemd[1]: Created slice user-500.slice. Feb 9 10:25:19.223509 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:25:19.226399 systemd-logind[1338]: New session 1 of user core. Feb 9 10:25:19.265844 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:25:19.267159 systemd[1]: Starting user@500.service... Feb 9 10:25:19.296190 (systemd)[1453]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:25:19.488177 systemd[1453]: Queued start job for default target default.target. Feb 9 10:25:19.488652 systemd[1453]: Reached target paths.target. Feb 9 10:25:19.488671 systemd[1453]: Reached target sockets.target. Feb 9 10:25:19.488682 systemd[1453]: Reached target timers.target. Feb 9 10:25:19.488705 systemd[1453]: Reached target basic.target. Feb 9 10:25:19.488800 systemd[1]: Started user@500.service. Feb 9 10:25:19.489620 systemd[1]: Started session-1.scope. Feb 9 10:25:19.490066 systemd[1453]: Reached target default.target. Feb 9 10:25:19.490217 systemd[1453]: Startup finished in 188ms. Feb 9 10:25:20.173199 login[1450]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:25:20.177511 systemd[1]: Started session-2.scope. Feb 9 10:25:20.178010 systemd-logind[1338]: New session 2 of user core. Feb 9 10:25:24.154089 waagent[1446]: 2024-02-09T10:25:24.153981Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 10:25:24.160706 waagent[1446]: 2024-02-09T10:25:24.160624Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 10:25:24.165327 waagent[1446]: 2024-02-09T10:25:24.165269Z INFO Daemon Daemon Python: 3.9.16 Feb 9 10:25:24.169960 waagent[1446]: 2024-02-09T10:25:24.169865Z INFO Daemon Daemon Run daemon Feb 9 10:25:24.174201 waagent[1446]: 2024-02-09T10:25:24.174139Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 10:25:24.191293 waagent[1446]: 2024-02-09T10:25:24.191164Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:25:24.205830 waagent[1446]: 2024-02-09T10:25:24.205712Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:25:24.215339 waagent[1446]: 2024-02-09T10:25:24.215275Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:25:24.220251 waagent[1446]: 2024-02-09T10:25:24.220190Z INFO Daemon Daemon Using waagent for provisioning Feb 9 10:25:24.225912 waagent[1446]: 2024-02-09T10:25:24.225849Z INFO Daemon Daemon Activate resource disk Feb 9 10:25:24.230512 waagent[1446]: 2024-02-09T10:25:24.230452Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 10:25:24.244703 waagent[1446]: 2024-02-09T10:25:24.244634Z INFO Daemon Daemon Found device: None Feb 9 10:25:24.249242 waagent[1446]: 2024-02-09T10:25:24.249181Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 10:25:24.257862 waagent[1446]: 2024-02-09T10:25:24.257804Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 10:25:24.269462 waagent[1446]: 2024-02-09T10:25:24.269398Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:25:24.276458 waagent[1446]: 2024-02-09T10:25:24.276396Z INFO Daemon Daemon Running default provisioning handler Feb 9 10:25:24.289145 waagent[1446]: 2024-02-09T10:25:24.289016Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:25:24.307286 waagent[1446]: 2024-02-09T10:25:24.307162Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:25:24.316800 waagent[1446]: 2024-02-09T10:25:24.316735Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:25:24.321928 waagent[1446]: 2024-02-09T10:25:24.321869Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 10:25:24.360908 waagent[1446]: 2024-02-09T10:25:24.360803Z INFO Daemon Daemon Successfully mounted dvd Feb 9 10:25:24.617231 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 10:25:24.678397 waagent[1446]: 2024-02-09T10:25:24.678257Z INFO Daemon Daemon Detect protocol endpoint Feb 9 10:25:24.683459 waagent[1446]: 2024-02-09T10:25:24.683396Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:25:24.689069 waagent[1446]: 2024-02-09T10:25:24.689011Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 10:25:24.695456 waagent[1446]: 2024-02-09T10:25:24.695399Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 10:25:24.701041 waagent[1446]: 2024-02-09T10:25:24.700982Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 10:25:24.706047 waagent[1446]: 2024-02-09T10:25:24.705991Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 10:25:24.823719 waagent[1446]: 2024-02-09T10:25:24.823637Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 10:25:24.830749 waagent[1446]: 2024-02-09T10:25:24.830704Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 10:25:24.836198 waagent[1446]: 2024-02-09T10:25:24.836140Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 10:25:25.295611 waagent[1446]: 2024-02-09T10:25:25.295471Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 10:25:25.311216 waagent[1446]: 2024-02-09T10:25:25.311146Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 10:25:25.317007 waagent[1446]: 2024-02-09T10:25:25.316945Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 10:25:25.387958 waagent[1446]: 2024-02-09T10:25:25.387835Z INFO Daemon Daemon Found private key matching thumbprint F6BE0226D033877503C613FFB268BF90DDE9B8C7 Feb 9 10:25:25.396493 waagent[1446]: 2024-02-09T10:25:25.396417Z INFO Daemon Daemon Certificate with thumbprint 99D23E19970271CCAB7685013FFCBFD79E721E5F has no matching private key. Feb 9 10:25:25.406158 waagent[1446]: 2024-02-09T10:25:25.406087Z INFO Daemon Daemon Fetch goal state completed Feb 9 10:25:25.458960 waagent[1446]: 2024-02-09T10:25:25.458868Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: a5a5fc45-3891-41fa-be7b-66f2e60791c6 New eTag: 16097335464223044136] Feb 9 10:25:25.469907 waagent[1446]: 2024-02-09T10:25:25.469834Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:25:25.485932 waagent[1446]: 2024-02-09T10:25:25.485854Z INFO Daemon Daemon Starting provisioning Feb 9 10:25:25.490979 waagent[1446]: 2024-02-09T10:25:25.490917Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 10:25:25.495761 waagent[1446]: 2024-02-09T10:25:25.495701Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-a099f8e901] Feb 9 10:25:25.551292 waagent[1446]: 2024-02-09T10:25:25.551120Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-a099f8e901] Feb 9 10:25:25.558066 waagent[1446]: 2024-02-09T10:25:25.557993Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 10:25:25.564934 waagent[1446]: 2024-02-09T10:25:25.564873Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 10:25:25.580571 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 10:25:25.580752 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 10:25:25.580814 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 10:25:25.581050 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:25:25.585731 systemd-networkd[1220]: eth0: DHCPv6 lease lost Feb 9 10:25:25.587223 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:25:25.587395 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:25:25.589475 systemd[1]: Starting systemd-networkd.service... Feb 9 10:25:25.616611 systemd-networkd[1495]: enP27523s1: Link UP Feb 9 10:25:25.616622 systemd-networkd[1495]: enP27523s1: Gained carrier Feb 9 10:25:25.617499 systemd-networkd[1495]: eth0: Link UP Feb 9 10:25:25.617511 systemd-networkd[1495]: eth0: Gained carrier Feb 9 10:25:25.617849 systemd-networkd[1495]: lo: Link UP Feb 9 10:25:25.617858 systemd-networkd[1495]: lo: Gained carrier Feb 9 10:25:25.618086 systemd-networkd[1495]: eth0: Gained IPv6LL Feb 9 10:25:25.619023 systemd-networkd[1495]: Enumeration completed Feb 9 10:25:25.619176 systemd[1]: Started systemd-networkd.service. Feb 9 10:25:25.620665 systemd-networkd[1495]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:25:25.620947 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:25:25.628141 waagent[1446]: 2024-02-09T10:25:25.623830Z INFO Daemon Daemon Create user account if not exists Feb 9 10:25:25.629986 waagent[1446]: 2024-02-09T10:25:25.629909Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 10:25:25.637498 waagent[1446]: 2024-02-09T10:25:25.637419Z INFO Daemon Daemon Configure sudoer Feb 9 10:25:25.642986 waagent[1446]: 2024-02-09T10:25:25.642918Z INFO Daemon Daemon Configure sshd Feb 9 10:25:25.647207 waagent[1446]: 2024-02-09T10:25:25.647143Z INFO Daemon Daemon Deploy ssh public key. Feb 9 10:25:25.651811 systemd-networkd[1495]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:25:25.654267 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:25:25.686878 waagent[1446]: 2024-02-09T10:25:25.686754Z INFO Daemon Daemon Decode custom data Feb 9 10:25:25.691841 waagent[1446]: 2024-02-09T10:25:25.691777Z INFO Daemon Daemon Save custom data Feb 9 10:25:26.873117 waagent[1446]: 2024-02-09T10:25:26.873041Z INFO Daemon Daemon Provisioning complete Feb 9 10:25:26.891059 waagent[1446]: 2024-02-09T10:25:26.890994Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 10:25:26.897180 waagent[1446]: 2024-02-09T10:25:26.897118Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 10:25:26.907909 waagent[1446]: 2024-02-09T10:25:26.907847Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 10:25:27.206360 waagent[1504]: 2024-02-09T10:25:27.206212Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 10:25:27.207430 waagent[1504]: 2024-02-09T10:25:27.207374Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:27.207659 waagent[1504]: 2024-02-09T10:25:27.207612Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:27.219796 waagent[1504]: 2024-02-09T10:25:27.219730Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 10:25:27.220056 waagent[1504]: 2024-02-09T10:25:27.220006Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 10:25:27.292305 waagent[1504]: 2024-02-09T10:25:27.292179Z INFO ExtHandler ExtHandler Found private key matching thumbprint F6BE0226D033877503C613FFB268BF90DDE9B8C7 Feb 9 10:25:27.292679 waagent[1504]: 2024-02-09T10:25:27.292625Z INFO ExtHandler ExtHandler Certificate with thumbprint 99D23E19970271CCAB7685013FFCBFD79E721E5F has no matching private key. Feb 9 10:25:27.293038 waagent[1504]: 2024-02-09T10:25:27.292984Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 10:25:27.310268 waagent[1504]: 2024-02-09T10:25:27.310207Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 982717e9-a263-4eb7-a070-8d424154d48c New eTag: 16097335464223044136] Feb 9 10:25:27.311142 waagent[1504]: 2024-02-09T10:25:27.311078Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:25:27.436536 waagent[1504]: 2024-02-09T10:25:27.436405Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:25:27.457426 waagent[1504]: 2024-02-09T10:25:27.457302Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1504 Feb 9 10:25:27.461191 waagent[1504]: 2024-02-09T10:25:27.461127Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:25:27.462573 waagent[1504]: 2024-02-09T10:25:27.462512Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:25:27.737217 waagent[1504]: 2024-02-09T10:25:27.737147Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:25:27.737630 waagent[1504]: 2024-02-09T10:25:27.737569Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:25:27.745465 waagent[1504]: 2024-02-09T10:25:27.745401Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:25:27.745988 waagent[1504]: 2024-02-09T10:25:27.745927Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:25:27.747148 waagent[1504]: 2024-02-09T10:25:27.747084Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 10:25:27.748477 waagent[1504]: 2024-02-09T10:25:27.748406Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:25:27.749139 waagent[1504]: 2024-02-09T10:25:27.749077Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:27.749404 waagent[1504]: 2024-02-09T10:25:27.749352Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:27.750107 waagent[1504]: 2024-02-09T10:25:27.750036Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:25:27.750782 waagent[1504]: 2024-02-09T10:25:27.750707Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:25:27.751195 waagent[1504]: 2024-02-09T10:25:27.751130Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:27.751418 waagent[1504]: 2024-02-09T10:25:27.751334Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:25:27.751630 waagent[1504]: 2024-02-09T10:25:27.751565Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:25:27.751887 waagent[1504]: 2024-02-09T10:25:27.751828Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:27.752155 waagent[1504]: 2024-02-09T10:25:27.752080Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:25:27.752155 waagent[1504]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:25:27.752155 waagent[1504]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:25:27.752155 waagent[1504]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:25:27.752155 waagent[1504]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:27.752155 waagent[1504]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:27.752155 waagent[1504]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:27.752606 waagent[1504]: 2024-02-09T10:25:27.752528Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:25:27.754732 waagent[1504]: 2024-02-09T10:25:27.754544Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:25:27.755303 waagent[1504]: 2024-02-09T10:25:27.755230Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:25:27.756803 waagent[1504]: 2024-02-09T10:25:27.756732Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:25:27.756968 waagent[1504]: 2024-02-09T10:25:27.756895Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:25:27.757254 waagent[1504]: 2024-02-09T10:25:27.757186Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:25:27.768584 waagent[1504]: 2024-02-09T10:25:27.768513Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 10:25:27.769420 waagent[1504]: 2024-02-09T10:25:27.769366Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:25:27.770492 waagent[1504]: 2024-02-09T10:25:27.770429Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 10:25:27.811128 waagent[1504]: 2024-02-09T10:25:27.811061Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 10:25:27.829809 waagent[1504]: 2024-02-09T10:25:27.829652Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1495' Feb 9 10:25:27.938377 waagent[1504]: 2024-02-09T10:25:27.938250Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:25:27.938377 waagent[1504]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:25:27.938377 waagent[1504]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:25:27.938377 waagent[1504]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8d:97 brd ff:ff:ff:ff:ff:ff Feb 9 10:25:27.938377 waagent[1504]: 3: enP27523s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8d:97 brd ff:ff:ff:ff:ff:ff\ altname enP27523p0s2 Feb 9 10:25:27.938377 waagent[1504]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:25:27.938377 waagent[1504]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:25:27.938377 waagent[1504]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:25:27.938377 waagent[1504]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:25:27.938377 waagent[1504]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:25:27.938377 waagent[1504]: 2: eth0 inet6 fe80::222:48ff:febc:8d97/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:25:28.016294 waagent[1504]: 2024-02-09T10:25:28.016186Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 10:25:28.912442 waagent[1446]: 2024-02-09T10:25:28.912272Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 10:25:28.916331 waagent[1446]: 2024-02-09T10:25:28.916278Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 10:25:30.028001 waagent[1535]: 2024-02-09T10:25:30.027902Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 10:25:30.029027 waagent[1535]: 2024-02-09T10:25:30.028971Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 10:25:30.029264 waagent[1535]: 2024-02-09T10:25:30.029215Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 10:25:30.037514 waagent[1535]: 2024-02-09T10:25:30.037404Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:25:30.038087 waagent[1535]: 2024-02-09T10:25:30.038029Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:30.038348 waagent[1535]: 2024-02-09T10:25:30.038297Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:30.051259 waagent[1535]: 2024-02-09T10:25:30.051188Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 10:25:30.065613 waagent[1535]: 2024-02-09T10:25:30.065553Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 10:25:30.066840 waagent[1535]: 2024-02-09T10:25:30.066780Z INFO ExtHandler Feb 9 10:25:30.067096 waagent[1535]: 2024-02-09T10:25:30.067045Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4039184b-951f-4275-b029-387856085f63 eTag: 16097335464223044136 source: Fabric] Feb 9 10:25:30.067946 waagent[1535]: 2024-02-09T10:25:30.067888Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 10:25:30.069302 waagent[1535]: 2024-02-09T10:25:30.069241Z INFO ExtHandler Feb 9 10:25:30.069540 waagent[1535]: 2024-02-09T10:25:30.069490Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 10:25:30.076152 waagent[1535]: 2024-02-09T10:25:30.076102Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 10:25:30.076776 waagent[1535]: 2024-02-09T10:25:30.076726Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:25:30.098177 waagent[1535]: 2024-02-09T10:25:30.098112Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 10:25:30.170127 waagent[1535]: 2024-02-09T10:25:30.169998Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F6BE0226D033877503C613FFB268BF90DDE9B8C7', 'hasPrivateKey': True} Feb 9 10:25:30.171333 waagent[1535]: 2024-02-09T10:25:30.171274Z INFO ExtHandler Downloaded certificate {'thumbprint': '99D23E19970271CCAB7685013FFCBFD79E721E5F', 'hasPrivateKey': False} Feb 9 10:25:30.172491 waagent[1535]: 2024-02-09T10:25:30.172428Z INFO ExtHandler Fetch goal state completed Feb 9 10:25:30.194980 waagent[1535]: 2024-02-09T10:25:30.194916Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1535 Feb 9 10:25:30.198554 waagent[1535]: 2024-02-09T10:25:30.198493Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:25:30.200165 waagent[1535]: 2024-02-09T10:25:30.200105Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:25:30.205097 waagent[1535]: 2024-02-09T10:25:30.205046Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:25:30.205592 waagent[1535]: 2024-02-09T10:25:30.205533Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:25:30.213233 waagent[1535]: 2024-02-09T10:25:30.213178Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:25:30.213876 waagent[1535]: 2024-02-09T10:25:30.213818Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:25:30.219737 waagent[1535]: 2024-02-09T10:25:30.219627Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 10:25:30.223424 waagent[1535]: 2024-02-09T10:25:30.223365Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 10:25:30.225003 waagent[1535]: 2024-02-09T10:25:30.224931Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:25:30.225287 waagent[1535]: 2024-02-09T10:25:30.225214Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:30.226110 waagent[1535]: 2024-02-09T10:25:30.226032Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:25:30.226234 waagent[1535]: 2024-02-09T10:25:30.226160Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:30.226946 waagent[1535]: 2024-02-09T10:25:30.226871Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:25:30.227661 waagent[1535]: 2024-02-09T10:25:30.227586Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:25:30.227661 waagent[1535]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:25:30.227661 waagent[1535]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:25:30.227661 waagent[1535]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:25:30.227661 waagent[1535]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:30.227661 waagent[1535]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:30.227661 waagent[1535]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:25:30.229825 waagent[1535]: 2024-02-09T10:25:30.229751Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:25:30.229927 waagent[1535]: 2024-02-09T10:25:30.229255Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:25:30.230263 waagent[1535]: 2024-02-09T10:25:30.230204Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:25:30.230632 waagent[1535]: 2024-02-09T10:25:30.230564Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:25:30.231680 waagent[1535]: 2024-02-09T10:25:30.231612Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:25:30.232016 waagent[1535]: 2024-02-09T10:25:30.231958Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:25:30.233664 waagent[1535]: 2024-02-09T10:25:30.233523Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:25:30.235502 waagent[1535]: 2024-02-09T10:25:30.235244Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:25:30.235792 waagent[1535]: 2024-02-09T10:25:30.235724Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:25:30.239769 waagent[1535]: 2024-02-09T10:25:30.239683Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:25:30.250425 waagent[1535]: 2024-02-09T10:25:30.250344Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:25:30.250425 waagent[1535]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:25:30.250425 waagent[1535]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:25:30.250425 waagent[1535]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8d:97 brd ff:ff:ff:ff:ff:ff Feb 9 10:25:30.250425 waagent[1535]: 3: enP27523s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8d:97 brd ff:ff:ff:ff:ff:ff\ altname enP27523p0s2 Feb 9 10:25:30.250425 waagent[1535]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:25:30.250425 waagent[1535]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:25:30.250425 waagent[1535]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:25:30.250425 waagent[1535]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:25:30.250425 waagent[1535]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:25:30.250425 waagent[1535]: 2: eth0 inet6 fe80::222:48ff:febc:8d97/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:25:30.258233 waagent[1535]: 2024-02-09T10:25:30.257968Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 10:25:30.260322 waagent[1535]: 2024-02-09T10:25:30.260239Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 10:25:30.278830 waagent[1535]: 2024-02-09T10:25:30.278745Z INFO ExtHandler ExtHandler Feb 9 10:25:30.279079 waagent[1535]: 2024-02-09T10:25:30.279024Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 692cc4bd-fb96-40e1-9bc6-805b1de1f841 correlation f02a9671-95ee-42c7-b8b9-c6cbdb5481c6 created: 2024-02-09T10:23:49.439720Z] Feb 9 10:25:30.280034 waagent[1535]: 2024-02-09T10:25:30.279979Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 10:25:30.281986 waagent[1535]: 2024-02-09T10:25:30.281931Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 10:25:30.313409 waagent[1535]: 2024-02-09T10:25:30.313262Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 10:25:30.328260 waagent[1535]: 2024-02-09T10:25:30.328189Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 4772116F-E8BE-4690-9963-825D043319B8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 10:25:30.519966 waagent[1535]: 2024-02-09T10:25:30.519844Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 10:25:30.519966 waagent[1535]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.519966 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.519966 waagent[1535]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.519966 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.519966 waagent[1535]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.519966 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.519966 waagent[1535]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:25:30.519966 waagent[1535]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:25:30.519966 waagent[1535]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:25:30.527380 waagent[1535]: 2024-02-09T10:25:30.527275Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 10:25:30.527380 waagent[1535]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.527380 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.527380 waagent[1535]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.527380 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.527380 waagent[1535]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:25:30.527380 waagent[1535]: pkts bytes target prot opt in out source destination Feb 9 10:25:30.527380 waagent[1535]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:25:30.527380 waagent[1535]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:25:30.527380 waagent[1535]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:25:30.528179 waagent[1535]: 2024-02-09T10:25:30.528129Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 10:25:50.088574 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 10:25:56.695192 systemd[1]: Created slice system-sshd.slice. Feb 9 10:25:56.696255 systemd[1]: Started sshd@0-10.200.20.12:22-10.200.12.6:48606.service. Feb 9 10:25:57.341041 sshd[1583]: Accepted publickey for core from 10.200.12.6 port 48606 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:25:57.391664 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:25:57.396079 systemd[1]: Started session-3.scope. Feb 9 10:25:57.396374 systemd-logind[1338]: New session 3 of user core. Feb 9 10:25:57.714321 systemd[1]: Started sshd@1-10.200.20.12:22-10.200.12.6:47964.service. Feb 9 10:25:58.124755 sshd[1588]: Accepted publickey for core from 10.200.12.6 port 47964 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:25:58.126403 sshd[1588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:25:58.130028 systemd-logind[1338]: New session 4 of user core. Feb 9 10:25:58.130448 systemd[1]: Started session-4.scope. Feb 9 10:25:58.370232 update_engine[1340]: I0209 10:25:58.369894 1340 update_attempter.cc:509] Updating boot flags... Feb 9 10:25:58.443471 sshd[1588]: pam_unix(sshd:session): session closed for user core Feb 9 10:25:58.446761 systemd[1]: sshd@1-10.200.20.12:22-10.200.12.6:47964.service: Deactivated successfully. Feb 9 10:25:58.447410 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:25:58.447954 systemd-logind[1338]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:25:58.449169 systemd-logind[1338]: Removed session 4. Feb 9 10:25:58.518076 systemd[1]: Started sshd@2-10.200.20.12:22-10.200.12.6:47978.service. Feb 9 10:25:58.936371 sshd[1633]: Accepted publickey for core from 10.200.12.6 port 47978 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:25:58.937912 sshd[1633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:25:58.941971 systemd[1]: Started session-5.scope. Feb 9 10:25:58.942483 systemd-logind[1338]: New session 5 of user core. Feb 9 10:25:59.239034 sshd[1633]: pam_unix(sshd:session): session closed for user core Feb 9 10:25:59.241431 systemd[1]: sshd@2-10.200.20.12:22-10.200.12.6:47978.service: Deactivated successfully. Feb 9 10:25:59.242111 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:25:59.242639 systemd-logind[1338]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:25:59.243500 systemd-logind[1338]: Removed session 5. Feb 9 10:25:59.310215 systemd[1]: Started sshd@3-10.200.20.12:22-10.200.12.6:47988.service. Feb 9 10:25:59.721611 sshd[1639]: Accepted publickey for core from 10.200.12.6 port 47988 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:25:59.722853 sshd[1639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:25:59.726530 systemd-logind[1338]: New session 6 of user core. Feb 9 10:25:59.726971 systemd[1]: Started session-6.scope. Feb 9 10:26:00.035051 sshd[1639]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:00.037972 systemd[1]: sshd@3-10.200.20.12:22-10.200.12.6:47988.service: Deactivated successfully. Feb 9 10:26:00.038609 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:26:00.039174 systemd-logind[1338]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:26:00.040002 systemd-logind[1338]: Removed session 6. Feb 9 10:26:00.106566 systemd[1]: Started sshd@4-10.200.20.12:22-10.200.12.6:48002.service. Feb 9 10:26:00.522244 sshd[1645]: Accepted publickey for core from 10.200.12.6 port 48002 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:26:00.523468 sshd[1645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:00.527235 systemd-logind[1338]: New session 7 of user core. Feb 9 10:26:00.527661 systemd[1]: Started session-7.scope. Feb 9 10:26:01.089048 sudo[1648]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:26:01.089239 sudo[1648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:01.120881 dbus-daemon[1323]: avc: received setenforce notice (enforcing=1) Feb 9 10:26:01.122704 sudo[1648]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:01.229280 sshd[1645]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:01.232817 systemd[1]: sshd@4-10.200.20.12:22-10.200.12.6:48002.service: Deactivated successfully. Feb 9 10:26:01.233192 systemd-logind[1338]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:26:01.233555 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:26:01.234587 systemd-logind[1338]: Removed session 7. Feb 9 10:26:01.298089 systemd[1]: Started sshd@5-10.200.20.12:22-10.200.12.6:48018.service. Feb 9 10:26:01.709412 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 48018 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:26:01.711110 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:01.714742 systemd-logind[1338]: New session 8 of user core. Feb 9 10:26:01.715178 systemd[1]: Started session-8.scope. Feb 9 10:26:01.946675 sudo[1656]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:26:01.946891 sudo[1656]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:01.949356 sudo[1656]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:01.953618 sudo[1655]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:26:01.954122 sudo[1655]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:01.965439 systemd[1]: Stopping audit-rules.service... Feb 9 10:26:01.971607 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:26:01.972050 kernel: audit: type=1305 audit(1707474361.965:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:26:01.965000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:26:01.967006 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:26:01.972699 auditctl[1659]: No rules Feb 9 10:26:01.967150 systemd[1]: Stopped audit-rules.service. Feb 9 10:26:01.968487 systemd[1]: Starting audit-rules.service... Feb 9 10:26:01.965000 audit[1659]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2b61580 a2=420 a3=0 items=0 ppid=1 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:02.004764 kernel: audit: type=1300 audit(1707474361.965:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2b61580 a2=420 a3=0 items=0 ppid=1 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:01.965000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:26:02.012202 kernel: audit: type=1327 audit(1707474361.965:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:26:01.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.016430 augenrules[1679]: No rules Feb 9 10:26:02.017339 systemd[1]: Finished audit-rules.service. Feb 9 10:26:02.029374 kernel: audit: type=1131 audit(1707474361.965:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.030928 sudo[1655]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:02.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.048940 kernel: audit: type=1130 audit(1707474362.012:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.049025 kernel: audit: type=1106 audit(1707474362.030:168): pid=1655 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.030000 audit[1655]: USER_END pid=1655 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.030000 audit[1655]: CRED_DISP pid=1655 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.085947 kernel: audit: type=1104 audit(1707474362.030:169): pid=1655 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.095521 sshd[1652]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:02.095000 audit[1652]: USER_END pid=1652 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.098278 systemd[1]: sshd@5-10.200.20.12:22-10.200.12.6:48018.service: Deactivated successfully. Feb 9 10:26:02.098966 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:26:02.123228 systemd-logind[1338]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:26:02.095000 audit[1652]: CRED_DISP pid=1652 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.143316 kernel: audit: type=1106 audit(1707474362.095:170): pid=1652 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.143513 kernel: audit: type=1104 audit(1707474362.095:171): pid=1652 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.143569 kernel: audit: type=1131 audit(1707474362.097:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:48018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:48018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.168815 systemd[1]: Started sshd@6-10.200.20.12:22-10.200.12.6:48024.service. Feb 9 10:26:02.174504 systemd-logind[1338]: Removed session 8. Feb 9 10:26:02.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.581224 sshd[1685]: Accepted publickey for core from 10.200.12.6 port 48024 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:26:02.580000 audit[1685]: USER_ACCT pid=1685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.581000 audit[1685]: CRED_ACQ pid=1685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.581000 audit[1685]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee004460 a2=3 a3=1 items=0 ppid=1 pid=1685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:02.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:26:02.582542 sshd[1685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:26:02.586600 systemd[1]: Started session-9.scope. Feb 9 10:26:02.587031 systemd-logind[1338]: New session 9 of user core. Feb 9 10:26:02.590000 audit[1685]: USER_START pid=1685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.591000 audit[1687]: CRED_ACQ pid=1687 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:02.818000 audit[1688]: USER_ACCT pid=1688 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.818000 audit[1688]: CRED_REFR pid=1688 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:02.819262 sudo[1688]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:26:02.819459 sudo[1688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:26:02.820000 audit[1688]: USER_START pid=1688 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:03.766808 systemd[1]: Starting docker.service... Feb 9 10:26:03.797089 env[1703]: time="2024-02-09T10:26:03.797042244Z" level=info msg="Starting up" Feb 9 10:26:03.798646 env[1703]: time="2024-02-09T10:26:03.798618853Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:26:03.798646 env[1703]: time="2024-02-09T10:26:03.798639974Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:26:03.798765 env[1703]: time="2024-02-09T10:26:03.798658574Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Feb 9 10:26:03.798765 env[1703]: time="2024-02-09T10:26:03.798667934Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:26:03.800134 env[1703]: time="2024-02-09T10:26:03.800107583Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:26:03.800134 env[1703]: time="2024-02-09T10:26:03.800127223Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:26:03.800236 env[1703]: time="2024-02-09T10:26:03.800140663Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Feb 9 10:26:03.800236 env[1703]: time="2024-02-09T10:26:03.800148703Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:26:03.875411 env[1703]: time="2024-02-09T10:26:03.875374327Z" level=info msg="Loading containers: start." Feb 9 10:26:03.957000 audit[1730]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.957000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffc860220 a2=0 a3=1 items=0 ppid=1703 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:26:03.959000 audit[1732]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.959000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd8511060 a2=0 a3=1 items=0 ppid=1703 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:26:03.961000 audit[1734]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.961000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc019dda0 a2=0 a3=1 items=0 ppid=1703 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:26:03.962000 audit[1736]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.962000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd65dae20 a2=0 a3=1 items=0 ppid=1703 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:26:03.964000 audit[1738]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.964000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffee1aacf0 a2=0 a3=1 items=0 ppid=1703 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:26:03.966000 audit[1740]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.966000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd0700ab0 a2=0 a3=1 items=0 ppid=1703 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:26:03.986000 audit[1742]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.986000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff7486f10 a2=0 a3=1 items=0 ppid=1703 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:26:03.988000 audit[1744]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.988000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe4f91060 a2=0 a3=1 items=0 ppid=1703 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:26:03.990000 audit[1746]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:03.990000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcac161d0 a2=0 a3=1 items=0 ppid=1703 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:03.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:04.005000 audit[1750]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.005000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd67a6360 a2=0 a3=1 items=0 ppid=1703 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:04.006000 audit[1751]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.006000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffec76da0 a2=0 a3=1 items=0 ppid=1703 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:04.053710 kernel: Initializing XFRM netlink socket Feb 9 10:26:04.107697 env[1703]: time="2024-02-09T10:26:04.107644958Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:26:04.206000 audit[1758]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.206000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc874e7c0 a2=0 a3=1 items=0 ppid=1703 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:26:04.252000 audit[1761]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.252000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff6a313e0 a2=0 a3=1 items=0 ppid=1703 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:26:04.254000 audit[1764]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.254000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff55c78c0 a2=0 a3=1 items=0 ppid=1703 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:26:04.256000 audit[1766]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.256000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffeaa57140 a2=0 a3=1 items=0 ppid=1703 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:26:04.258000 audit[1768]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.258000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffcd088020 a2=0 a3=1 items=0 ppid=1703 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.258000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:26:04.259000 audit[1770]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.259000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff721d550 a2=0 a3=1 items=0 ppid=1703 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.259000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:26:04.261000 audit[1772]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.261000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd9b20b70 a2=0 a3=1 items=0 ppid=1703 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:26:04.263000 audit[1774]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.263000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdf50b000 a2=0 a3=1 items=0 ppid=1703 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:26:04.265000 audit[1776]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.265000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff95249f0 a2=0 a3=1 items=0 ppid=1703 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:26:04.266000 audit[1778]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.266000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffed67bf00 a2=0 a3=1 items=0 ppid=1703 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:26:04.268000 audit[1780]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.268000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9e762e0 a2=0 a3=1 items=0 ppid=1703 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:26:04.269769 systemd-networkd[1495]: docker0: Link UP Feb 9 10:26:04.287000 audit[1784]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.287000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd60282f0 a2=0 a3=1 items=0 ppid=1703 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.287000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:04.288000 audit[1785]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:04.288000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe62674f0 a2=0 a3=1 items=0 ppid=1703 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:04.288000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:26:04.289832 env[1703]: time="2024-02-09T10:26:04.289804611Z" level=info msg="Loading containers: done." Feb 9 10:26:04.300981 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2953602945-merged.mount: Deactivated successfully. Feb 9 10:26:04.335395 env[1703]: time="2024-02-09T10:26:04.335352234Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:26:04.335821 env[1703]: time="2024-02-09T10:26:04.335802636Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:26:04.336023 env[1703]: time="2024-02-09T10:26:04.336008718Z" level=info msg="Daemon has completed initialization" Feb 9 10:26:04.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:04.367995 systemd[1]: Started docker.service. Feb 9 10:26:04.376339 env[1703]: time="2024-02-09T10:26:04.376279110Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:26:04.392488 systemd[1]: Reloading. Feb 9 10:26:04.452832 /usr/lib/systemd/system-generators/torcx-generator[1831]: time="2024-02-09T10:26:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:26:04.452860 /usr/lib/systemd/system-generators/torcx-generator[1831]: time="2024-02-09T10:26:04Z" level=info msg="torcx already run" Feb 9 10:26:04.522003 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:26:04.522021 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:26:04.536990 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:26:04.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit: BPF prog-id=32 op=LOAD Feb 9 10:26:04.602000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit: BPF prog-id=33 op=LOAD Feb 9 10:26:04.602000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit: BPF prog-id=34 op=LOAD Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.602000 audit: BPF prog-id=35 op=LOAD Feb 9 10:26:04.602000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:26:04.602000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit: BPF prog-id=36 op=LOAD Feb 9 10:26:04.603000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit: BPF prog-id=37 op=LOAD Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit: BPF prog-id=38 op=LOAD Feb 9 10:26:04.604000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:26:04.604000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit: BPF prog-id=39 op=LOAD Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.604000 audit: BPF prog-id=40 op=LOAD Feb 9 10:26:04.604000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:26:04.604000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit: BPF prog-id=41 op=LOAD Feb 9 10:26:04.605000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit: BPF prog-id=42 op=LOAD Feb 9 10:26:04.606000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.606000 audit: BPF prog-id=43 op=LOAD Feb 9 10:26:04.606000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit: BPF prog-id=44 op=LOAD Feb 9 10:26:04.609000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit: BPF prog-id=45 op=LOAD Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:04.609000 audit: BPF prog-id=46 op=LOAD Feb 9 10:26:04.609000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:26:04.609000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:26:04.616659 systemd[1]: Started kubelet.service. Feb 9 10:26:04.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:04.697928 kubelet[1890]: E0209 10:26:04.697850 1890 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:26:04.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:04.700447 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:26:04.700562 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:26:08.679654 env[1350]: time="2024-02-09T10:26:08.679427536Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 10:26:09.444342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3431459328.mount: Deactivated successfully. Feb 9 10:26:11.982442 env[1350]: time="2024-02-09T10:26:11.982386317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:11.988587 env[1350]: time="2024-02-09T10:26:11.988551148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:11.993491 env[1350]: time="2024-02-09T10:26:11.993451925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:12.003117 env[1350]: time="2024-02-09T10:26:12.003065179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:12.003987 env[1350]: time="2024-02-09T10:26:12.003955809Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 10:26:12.012882 env[1350]: time="2024-02-09T10:26:12.012855279Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 10:26:14.496911 env[1350]: time="2024-02-09T10:26:14.496859210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:14.511198 env[1350]: time="2024-02-09T10:26:14.511139119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:14.516542 env[1350]: time="2024-02-09T10:26:14.516500008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:14.524671 env[1350]: time="2024-02-09T10:26:14.524619285Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:14.525442 env[1350]: time="2024-02-09T10:26:14.525415668Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 10:26:14.534227 env[1350]: time="2024-02-09T10:26:14.534191039Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 10:26:14.709620 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:26:14.715343 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 10:26:14.715459 kernel: audit: type=1130 audit(1707474374.709:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.709812 systemd[1]: Stopped kubelet.service. Feb 9 10:26:14.711254 systemd[1]: Started kubelet.service. Feb 9 10:26:14.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.744903 kernel: audit: type=1131 audit(1707474374.709:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.745024 kernel: audit: type=1130 audit(1707474374.709:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:14.802500 kubelet[1919]: E0209 10:26:14.802394 1919 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:26:14.805664 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:26:14.805801 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:26:14.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:14.823767 kernel: audit: type=1131 audit(1707474374.805:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:16.009345 env[1350]: time="2024-02-09T10:26:16.009295837Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:16.022085 env[1350]: time="2024-02-09T10:26:16.022053797Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:16.029849 env[1350]: time="2024-02-09T10:26:16.029810687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:16.034762 env[1350]: time="2024-02-09T10:26:16.034730333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:16.035728 env[1350]: time="2024-02-09T10:26:16.035697490Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 10:26:16.045094 env[1350]: time="2024-02-09T10:26:16.045045765Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:26:17.400784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount77723322.mount: Deactivated successfully. Feb 9 10:26:18.049978 env[1350]: time="2024-02-09T10:26:18.049920371Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.056526 env[1350]: time="2024-02-09T10:26:18.056480786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.060772 env[1350]: time="2024-02-09T10:26:18.060739339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.064775 env[1350]: time="2024-02-09T10:26:18.064742903Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.065227 env[1350]: time="2024-02-09T10:26:18.065197572Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:26:18.073975 env[1350]: time="2024-02-09T10:26:18.073940273Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:26:18.664990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3754681786.mount: Deactivated successfully. Feb 9 10:26:18.691167 env[1350]: time="2024-02-09T10:26:18.691121477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.700448 env[1350]: time="2024-02-09T10:26:18.700413588Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.705763 env[1350]: time="2024-02-09T10:26:18.705735370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.712770 env[1350]: time="2024-02-09T10:26:18.712734818Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:18.713398 env[1350]: time="2024-02-09T10:26:18.713370731Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 10:26:18.722188 env[1350]: time="2024-02-09T10:26:18.722157344Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 10:26:19.622467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3787659922.mount: Deactivated successfully. Feb 9 10:26:23.606767 env[1350]: time="2024-02-09T10:26:23.606718000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:23.616664 env[1350]: time="2024-02-09T10:26:23.616622119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:23.621523 env[1350]: time="2024-02-09T10:26:23.621483194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:23.626921 env[1350]: time="2024-02-09T10:26:23.626882856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:23.627607 env[1350]: time="2024-02-09T10:26:23.627577536Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 10:26:23.637078 env[1350]: time="2024-02-09T10:26:23.637052729Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 10:26:24.394587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2067956092.mount: Deactivated successfully. Feb 9 10:26:24.959675 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 10:26:24.959864 systemd[1]: Stopped kubelet.service. Feb 9 10:26:24.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:24.961316 systemd[1]: Started kubelet.service. Feb 9 10:26:24.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:24.990470 env[1350]: time="2024-02-09T10:26:24.989767440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:24.996696 kernel: audit: type=1130 audit(1707474384.959:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:24.996825 kernel: audit: type=1131 audit(1707474384.959:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:24.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:25.002117 env[1350]: time="2024-02-09T10:26:25.001200865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:25.005728 env[1350]: time="2024-02-09T10:26:25.005417244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:25.008965 env[1350]: time="2024-02-09T10:26:25.008934944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:25.009707 env[1350]: time="2024-02-09T10:26:25.009327320Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 10:26:25.014454 kernel: audit: type=1130 audit(1707474384.960:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:25.059736 kubelet[1947]: E0209 10:26:25.059666 1947 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:26:25.062929 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:26:25.063052 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:26:25.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:25.082710 kernel: audit: type=1131 audit(1707474385.062:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:26:30.357018 systemd[1]: Stopped kubelet.service. Feb 9 10:26:30.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:30.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:30.393291 kernel: audit: type=1130 audit(1707474390.356:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:30.393372 kernel: audit: type=1131 audit(1707474390.356:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:30.401898 systemd[1]: Reloading. Feb 9 10:26:30.473250 /usr/lib/systemd/system-generators/torcx-generator[2033]: time="2024-02-09T10:26:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:26:30.473281 /usr/lib/systemd/system-generators/torcx-generator[2033]: time="2024-02-09T10:26:30Z" level=info msg="torcx already run" Feb 9 10:26:30.525982 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:26:30.526195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:26:30.541902 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.644659 kernel: audit: type=1400 audit(1707474390.608:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.644780 kernel: audit: type=1400 audit(1707474390.608:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.661390 kernel: audit: type=1400 audit(1707474390.608:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.678344 kernel: audit: type=1400 audit(1707474390.608:394): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.695101 kernel: audit: type=1400 audit(1707474390.608:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.695175 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.716761 kernel: audit: type=1400 audit(1707474390.608:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.716840 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit: BPF prog-id=47 op=LOAD Feb 9 10:26:30.624000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit: BPF prog-id=48 op=LOAD Feb 9 10:26:30.643000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit: BPF prog-id=49 op=LOAD Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit: BPF prog-id=50 op=LOAD Feb 9 10:26:30.659000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:26:30.659000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit: BPF prog-id=51 op=LOAD Feb 9 10:26:30.677000 audit: BPF prog-id=36 op=UNLOAD Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit: BPF prog-id=52 op=LOAD Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit: BPF prog-id=53 op=LOAD Feb 9 10:26:30.722000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:26:30.722000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit: BPF prog-id=54 op=LOAD Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.722000 audit: BPF prog-id=55 op=LOAD Feb 9 10:26:30.722000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:26:30.722000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.723000 audit: BPF prog-id=56 op=LOAD Feb 9 10:26:30.723000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit: BPF prog-id=57 op=LOAD Feb 9 10:26:30.724000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.724000 audit: BPF prog-id=58 op=LOAD Feb 9 10:26:30.724000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit: BPF prog-id=59 op=LOAD Feb 9 10:26:30.727000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit: BPF prog-id=60 op=LOAD Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:30.727000 audit: BPF prog-id=61 op=LOAD Feb 9 10:26:30.727000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:26:30.727000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:26:30.748776 systemd[1]: Started kubelet.service. Feb 9 10:26:30.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:30.794728 kubelet[2089]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:26:30.794728 kubelet[2089]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:26:30.795053 kubelet[2089]: I0209 10:26:30.794767 2089 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:26:30.795915 kubelet[2089]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:26:30.795915 kubelet[2089]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:26:31.977965 kubelet[2089]: I0209 10:26:31.977931 2089 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:26:31.977965 kubelet[2089]: I0209 10:26:31.977957 2089 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:26:31.978314 kubelet[2089]: I0209 10:26:31.978143 2089 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:26:31.982551 kubelet[2089]: E0209 10:26:31.982528 2089 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.12:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:31.982676 kubelet[2089]: W0209 10:26:31.982646 2089 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:26:31.982757 kubelet[2089]: I0209 10:26:31.982745 2089 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:26:31.983115 kubelet[2089]: I0209 10:26:31.983097 2089 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:26:31.983305 kubelet[2089]: I0209 10:26:31.983291 2089 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:26:31.983372 kubelet[2089]: I0209 10:26:31.983356 2089 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:26:31.983458 kubelet[2089]: I0209 10:26:31.983381 2089 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:26:31.983458 kubelet[2089]: I0209 10:26:31.983391 2089 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:26:31.983507 kubelet[2089]: I0209 10:26:31.983481 2089 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:26:31.989738 kubelet[2089]: I0209 10:26:31.989721 2089 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:26:31.989867 kubelet[2089]: I0209 10:26:31.989856 2089 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:26:31.989964 kubelet[2089]: I0209 10:26:31.989954 2089 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:26:31.990028 kubelet[2089]: I0209 10:26:31.990018 2089 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:26:31.990206 kubelet[2089]: W0209 10:26:31.990147 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a099f8e901&limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:31.990314 kubelet[2089]: E0209 10:26:31.990296 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a099f8e901&limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:31.990701 kubelet[2089]: W0209 10:26:31.990650 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:31.990805 kubelet[2089]: E0209 10:26:31.990794 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:31.990927 kubelet[2089]: I0209 10:26:31.990915 2089 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:26:31.991250 kubelet[2089]: W0209 10:26:31.991234 2089 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:26:31.991661 kubelet[2089]: I0209 10:26:31.991641 2089 server.go:1186] "Started kubelet" Feb 9 10:26:31.992000 audit[2089]: AVC avc: denied { mac_admin } for pid=2089 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:31.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:31.992000 audit[2089]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fa32f0 a1=40008592f0 a2=4000fa32c0 a3=25 items=0 ppid=1 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:31.992000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:31.993411 kubelet[2089]: I0209 10:26:31.993394 2089 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:26:31.992000 audit[2089]: AVC avc: denied { mac_admin } for pid=2089 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:31.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:31.992000 audit[2089]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000eb6a40 a1=4000859308 a2=4000fa3380 a3=25 items=0 ppid=1 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:31.992000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:31.993715 kubelet[2089]: I0209 10:26:31.993680 2089 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:26:31.993846 kubelet[2089]: I0209 10:26:31.993834 2089 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:26:31.994796 kubelet[2089]: E0209 10:26:31.994768 2089 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:26:31.994796 kubelet[2089]: E0209 10:26:31.994795 2089 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:26:31.995077 kubelet[2089]: E0209 10:26:31.994983 2089 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b5bc9579", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 991620985, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 991620985, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.12:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.12:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:26:31.995000 audit[2101]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:31.995000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffec3ca060 a2=0 a3=1 items=0 ppid=2089 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:31.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:26:31.997012 kubelet[2089]: I0209 10:26:31.996987 2089 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:26:31.997146 kubelet[2089]: I0209 10:26:31.997132 2089 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:26:31.997535 kubelet[2089]: I0209 10:26:31.997491 2089 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:26:31.997000 audit[2102]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:31.997000 audit[2102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3528b50 a2=0 a3=1 items=0 ppid=2089 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:31.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:26:31.998719 kubelet[2089]: I0209 10:26:31.998681 2089 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:26:32.000155 kubelet[2089]: E0209 10:26:32.000121 2089 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.000000 audit[2104]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.000000 audit[2104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc91459d0 a2=0 a3=1 items=0 ppid=2089 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.001159 kubelet[2089]: W0209 10:26:32.001098 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.001159 kubelet[2089]: E0209 10:26:32.001137 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:26:32.002000 audit[2106]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.002000 audit[2106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffec4bcfa0 a2=0 a3=1 items=0 ppid=2089 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:26:32.033997 kubelet[2089]: I0209 10:26:32.033961 2089 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:26:32.033997 kubelet[2089]: I0209 10:26:32.033979 2089 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:26:32.033997 kubelet[2089]: I0209 10:26:32.033997 2089 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:26:32.040000 audit[2111]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.040000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc28aab10 a2=0 a3=1 items=0 ppid=2089 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:26:32.041060 kubelet[2089]: I0209 10:26:32.041010 2089 policy_none.go:49] "None policy: Start" Feb 9 10:26:32.041618 kubelet[2089]: I0209 10:26:32.041596 2089 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:26:32.041618 kubelet[2089]: I0209 10:26:32.041615 2089 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:26:32.041000 audit[2112]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.041000 audit[2112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe20fc020 a2=0 a3=1 items=0 ppid=2089 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:26:32.050631 systemd[1]: Created slice kubepods.slice. Feb 9 10:26:32.054661 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:26:32.057472 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:26:32.065382 kubelet[2089]: I0209 10:26:32.065358 2089 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:26:32.064000 audit[2089]: AVC avc: denied { mac_admin } for pid=2089 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:32.064000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:32.064000 audit[2089]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e18ba0 a1=4000fae078 a2=4000e18b70 a3=25 items=0 ppid=1 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.064000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:32.065735 kubelet[2089]: I0209 10:26:32.065419 2089 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:26:32.065735 kubelet[2089]: I0209 10:26:32.065644 2089 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:26:32.066704 kubelet[2089]: E0209 10:26:32.066661 2089 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-a099f8e901\" not found" Feb 9 10:26:32.100042 kubelet[2089]: I0209 10:26:32.099999 2089 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.100547 kubelet[2089]: E0209 10:26:32.100521 2089 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.12:6443/api/v1/nodes\": dial tcp 10.200.20.12:6443: connect: connection refused" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.128000 audit[2116]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.128000 audit[2116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe526a750 a2=0 a3=1 items=0 ppid=2089 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:26:32.153000 audit[2119]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.153000 audit[2119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe0a1d310 a2=0 a3=1 items=0 ppid=2089 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:26:32.154000 audit[2120]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.154000 audit[2120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe6492310 a2=0 a3=1 items=0 ppid=2089 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:26:32.155000 audit[2121]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.155000 audit[2121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc42a26e0 a2=0 a3=1 items=0 ppid=2089 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:26:32.157000 audit[2123]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.157000 audit[2123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcc0a9500 a2=0 a3=1 items=0 ppid=2089 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:26:32.158000 audit[2125]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.158000 audit[2125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe4aa08a0 a2=0 a3=1 items=0 ppid=2089 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:26:32.160000 audit[2127]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.160000 audit[2127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffdd4f1060 a2=0 a3=1 items=0 ppid=2089 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:26:32.162000 audit[2129]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.162000 audit[2129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe7394fa0 a2=0 a3=1 items=0 ppid=2089 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:26:32.164000 audit[2131]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.164000 audit[2131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffeef2bc10 a2=0 a3=1 items=0 ppid=2089 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:26:32.165887 kubelet[2089]: I0209 10:26:32.165861 2089 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:26:32.165000 audit[2132]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.165000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe83e9040 a2=0 a3=1 items=0 ppid=2089 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:26:32.166000 audit[2133]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.166000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc459a1f0 a2=0 a3=1 items=0 ppid=2089 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:26:32.167000 audit[2134]: NETFILTER_CFG table=nat:46 family=10 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.167000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe6ffa8c0 a2=0 a3=1 items=0 ppid=2089 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:26:32.167000 audit[2135]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.167000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2fd6a50 a2=0 a3=1 items=0 ppid=2089 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:26:32.168000 audit[2137]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:32.168000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff2aaa80 a2=0 a3=1 items=0 ppid=2089 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:26:32.169000 audit[2138]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.169000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe4ca5710 a2=0 a3=1 items=0 ppid=2089 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:26:32.170000 audit[2139]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.170000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd1338ee0 a2=0 a3=1 items=0 ppid=2089 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:26:32.172000 audit[2141]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.172000 audit[2141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff0270d70 a2=0 a3=1 items=0 ppid=2089 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:26:32.173000 audit[2142]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.173000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc24a8aa0 a2=0 a3=1 items=0 ppid=2089 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:26:32.174000 audit[2143]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.174000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd55f2d00 a2=0 a3=1 items=0 ppid=2089 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:26:32.175000 audit[2145]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.175000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd1147500 a2=0 a3=1 items=0 ppid=2089 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:26:32.177000 audit[2147]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.177000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd8ae3450 a2=0 a3=1 items=0 ppid=2089 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:26:32.179000 audit[2149]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.179000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc8c33770 a2=0 a3=1 items=0 ppid=2089 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:26:32.181000 audit[2151]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.181000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc354ef60 a2=0 a3=1 items=0 ppid=2089 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:26:32.200630 kubelet[2089]: E0209 10:26:32.200581 2089 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.208000 audit[2153]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.208000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffffbb88260 a2=0 a3=1 items=0 ppid=2089 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:26:32.209741 kubelet[2089]: I0209 10:26:32.209722 2089 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:26:32.209741 kubelet[2089]: I0209 10:26:32.209742 2089 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:26:32.209845 kubelet[2089]: I0209 10:26:32.209760 2089 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:26:32.209845 kubelet[2089]: E0209 10:26:32.209804 2089 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:26:32.210411 kubelet[2089]: W0209 10:26:32.210173 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.210411 kubelet[2089]: E0209 10:26:32.210204 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.210000 audit[2154]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.210000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd70d5990 a2=0 a3=1 items=0 ppid=2089 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:26:32.211000 audit[2155]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.211000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5131130 a2=0 a3=1 items=0 ppid=2089 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:26:32.212000 audit[2156]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:32.212000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa586a40 a2=0 a3=1 items=0 ppid=2089 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:32.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:26:32.302418 kubelet[2089]: I0209 10:26:32.302330 2089 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.302838 kubelet[2089]: E0209 10:26:32.302823 2089 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.12:6443/api/v1/nodes\": dial tcp 10.200.20.12:6443: connect: connection refused" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.309884 kubelet[2089]: I0209 10:26:32.309870 2089 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:32.311242 kubelet[2089]: I0209 10:26:32.311216 2089 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:32.312310 kubelet[2089]: I0209 10:26:32.312286 2089 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:32.313888 kubelet[2089]: I0209 10:26:32.313777 2089 status_manager.go:698] "Failed to get status for pod" podUID=2691b74587ce28c318c265fe1d19e57b pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" err="Get \"https://10.200.20.12:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-a099f8e901\": dial tcp 10.200.20.12:6443: connect: connection refused" Feb 9 10:26:32.313963 kubelet[2089]: I0209 10:26:32.313930 2089 status_manager.go:698] "Failed to get status for pod" podUID=e332ed3eea3db1a830fe72beea5a9326 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" err="Get \"https://10.200.20.12:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-a099f8e901\": dial tcp 10.200.20.12:6443: connect: connection refused" Feb 9 10:26:32.316432 kubelet[2089]: I0209 10:26:32.316409 2089 status_manager.go:698] "Failed to get status for pod" podUID=35db51d4b6ee07609dec0ef9679fe250 pod="kube-system/kube-scheduler-ci-3510.3.2-a-a099f8e901" err="Get \"https://10.200.20.12:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-a099f8e901\": dial tcp 10.200.20.12:6443: connect: connection refused" Feb 9 10:26:32.318597 systemd[1]: Created slice kubepods-burstable-pod2691b74587ce28c318c265fe1d19e57b.slice. Feb 9 10:26:32.333223 systemd[1]: Created slice kubepods-burstable-pode332ed3eea3db1a830fe72beea5a9326.slice. Feb 9 10:26:32.337160 systemd[1]: Created slice kubepods-burstable-pod35db51d4b6ee07609dec0ef9679fe250.slice. Feb 9 10:26:32.400143 kubelet[2089]: I0209 10:26:32.400108 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400143 kubelet[2089]: I0209 10:26:32.400148 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400309 kubelet[2089]: I0209 10:26:32.400170 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400309 kubelet[2089]: I0209 10:26:32.400193 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400309 kubelet[2089]: I0209 10:26:32.400214 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400309 kubelet[2089]: I0209 10:26:32.400233 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400309 kubelet[2089]: I0209 10:26:32.400257 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400427 kubelet[2089]: I0209 10:26:32.400277 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.400427 kubelet[2089]: I0209 10:26:32.400307 2089 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/35db51d4b6ee07609dec0ef9679fe250-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-a099f8e901\" (UID: \"35db51d4b6ee07609dec0ef9679fe250\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.601138 kubelet[2089]: E0209 10:26:32.601038 2089 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.633352 env[1350]: time="2024-02-09T10:26:32.633011892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-a099f8e901,Uid:2691b74587ce28c318c265fe1d19e57b,Namespace:kube-system,Attempt:0,}" Feb 9 10:26:32.637737 env[1350]: time="2024-02-09T10:26:32.637444403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-a099f8e901,Uid:e332ed3eea3db1a830fe72beea5a9326,Namespace:kube-system,Attempt:0,}" Feb 9 10:26:32.639654 env[1350]: time="2024-02-09T10:26:32.639624783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-a099f8e901,Uid:35db51d4b6ee07609dec0ef9679fe250,Namespace:kube-system,Attempt:0,}" Feb 9 10:26:32.704302 kubelet[2089]: I0209 10:26:32.704277 2089 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.704796 kubelet[2089]: E0209 10:26:32.704781 2089 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.12:6443/api/v1/nodes\": dial tcp 10.200.20.12:6443: connect: connection refused" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:32.881881 kubelet[2089]: W0209 10:26:32.881743 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a099f8e901&limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.881881 kubelet[2089]: E0209 10:26:32.881826 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.12:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-a099f8e901&limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.958636 kubelet[2089]: W0209 10:26:32.958580 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:32.958636 kubelet[2089]: E0209 10:26:32.958639 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.12:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.090242 kubelet[2089]: W0209 10:26:33.090156 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.090242 kubelet[2089]: E0209 10:26:33.090217 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.12:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.381297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1487033141.mount: Deactivated successfully. Feb 9 10:26:33.401859 kubelet[2089]: E0209 10:26:33.401817 2089 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.437523 env[1350]: time="2024-02-09T10:26:33.437478000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.442530 env[1350]: time="2024-02-09T10:26:33.442492448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.465600 env[1350]: time="2024-02-09T10:26:33.465545199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.469368 env[1350]: time="2024-02-09T10:26:33.469336731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.476805 env[1350]: time="2024-02-09T10:26:33.476774414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.484325 env[1350]: time="2024-02-09T10:26:33.484288088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.488357 env[1350]: time="2024-02-09T10:26:33.488332666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.492973 env[1350]: time="2024-02-09T10:26:33.492948367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.496749 env[1350]: time="2024-02-09T10:26:33.496726021Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.500825 env[1350]: time="2024-02-09T10:26:33.500800435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.507034 kubelet[2089]: I0209 10:26:33.506716 2089 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:33.507034 kubelet[2089]: E0209 10:26:33.507010 2089 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.12:6443/api/v1/nodes\": dial tcp 10.200.20.12:6443: connect: connection refused" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:33.507294 env[1350]: time="2024-02-09T10:26:33.507270808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.545277 env[1350]: time="2024-02-09T10:26:33.545230962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:33.594917 kubelet[2089]: W0209 10:26:33.594859 2089 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.594917 kubelet[2089]: E0209 10:26:33.594896 2089 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.12:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.12:6443: connect: connection refused Feb 9 10:26:33.606969 env[1350]: time="2024-02-09T10:26:33.604215699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:26:33.606969 env[1350]: time="2024-02-09T10:26:33.604259053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:26:33.606969 env[1350]: time="2024-02-09T10:26:33.604269251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:26:33.606969 env[1350]: time="2024-02-09T10:26:33.604470384Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8 pid=2165 runtime=io.containerd.runc.v2 Feb 9 10:26:33.625605 systemd[1]: Started cri-containerd-48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8.scope. Feb 9 10:26:33.630601 env[1350]: time="2024-02-09T10:26:33.630508216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:26:33.630601 env[1350]: time="2024-02-09T10:26:33.630546331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:26:33.630886 env[1350]: time="2024-02-09T10:26:33.630556689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:26:33.631155 env[1350]: time="2024-02-09T10:26:33.631073580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2 pid=2193 runtime=io.containerd.runc.v2 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.640000 audit: BPF prog-id=62 op=LOAD Feb 9 10:26:33.641000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.641000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613734653238633639643533643463323435313231396463656134 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613734653238633639643533643463323435313231396463656134 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.642000 audit: BPF prog-id=63 op=LOAD Feb 9 10:26:33.642000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613734653238633639643533643463323435313231396463656134 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.643000 audit: BPF prog-id=64 op=LOAD Feb 9 10:26:33.643000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613734653238633639643533643463323435313231396463656134 Feb 9 10:26:33.643000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:26:33.643000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { perfmon } for pid=2175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit[2175]: AVC avc: denied { bpf } for pid=2175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.644000 audit: BPF prog-id=65 op=LOAD Feb 9 10:26:33.644000 audit[2175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2165 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613734653238633639643533643463323435313231396463656134 Feb 9 10:26:33.659988 systemd[1]: Started cri-containerd-8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2.scope. Feb 9 10:26:33.670910 env[1350]: time="2024-02-09T10:26:33.670849490Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:26:33.671258 env[1350]: time="2024-02-09T10:26:33.671231719Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:26:33.671390 env[1350]: time="2024-02-09T10:26:33.671367061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:26:33.671628 env[1350]: time="2024-02-09T10:26:33.671598270Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b629b658924e086033c0cb43cebf33908c2a14c223b6899c2ff657a29fcb95d7 pid=2223 runtime=io.containerd.runc.v2 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit: BPF prog-id=66 op=LOAD Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2193 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864663836313831333034376433316139373937666136303132313366 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2193 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864663836313831333034376433316139373937666136303132313366 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit: BPF prog-id=67 op=LOAD Feb 9 10:26:33.673000 audit[2209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2193 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864663836313831333034376433316139373937666136303132313366 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.673000 audit: BPF prog-id=68 op=LOAD Feb 9 10:26:33.673000 audit[2209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2193 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864663836313831333034376433316139373937666136303132313366 Feb 9 10:26:33.674000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:26:33.674000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { perfmon } for pid=2209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit[2209]: AVC avc: denied { bpf } for pid=2209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.674000 audit: BPF prog-id=69 op=LOAD Feb 9 10:26:33.674000 audit[2209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2193 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864663836313831333034376433316139373937666136303132313366 Feb 9 10:26:33.677093 env[1350]: time="2024-02-09T10:26:33.677052419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-a099f8e901,Uid:e332ed3eea3db1a830fe72beea5a9326,Namespace:kube-system,Attempt:0,} returns sandbox id \"48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8\"" Feb 9 10:26:33.683361 env[1350]: time="2024-02-09T10:26:33.683324259Z" level=info msg="CreateContainer within sandbox \"48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:26:33.692933 systemd[1]: Started cri-containerd-b629b658924e086033c0cb43cebf33908c2a14c223b6899c2ff657a29fcb95d7.scope. Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit: BPF prog-id=70 op=LOAD Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001cbb38 a2=10 a3=0 items=0 ppid=2223 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323962363538393234653038363033336330636234336365626633 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001cb5a0 a2=3c a3=0 items=0 ppid=2223 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323962363538393234653038363033336330636234336365626633 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit: BPF prog-id=71 op=LOAD Feb 9 10:26:33.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cb8e0 a2=78 a3=0 items=0 ppid=2223 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323962363538393234653038363033336330636234336365626633 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit: BPF prog-id=72 op=LOAD Feb 9 10:26:33.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001cb670 a2=78 a3=0 items=0 ppid=2223 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323962363538393234653038363033336330636234336365626633 Feb 9 10:26:33.713000 audit: BPF prog-id=72 op=UNLOAD Feb 9 10:26:33.713000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.713000 audit: BPF prog-id=73 op=LOAD Feb 9 10:26:33.713000 audit[2248]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cbb40 a2=78 a3=0 items=0 ppid=2223 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236323962363538393234653038363033336330636234336365626633 Feb 9 10:26:33.717028 env[1350]: time="2024-02-09T10:26:33.716983749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-a099f8e901,Uid:35db51d4b6ee07609dec0ef9679fe250,Namespace:kube-system,Attempt:0,} returns sandbox id \"8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2\"" Feb 9 10:26:33.719602 env[1350]: time="2024-02-09T10:26:33.719571322Z" level=info msg="CreateContainer within sandbox \"8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:26:33.738326 env[1350]: time="2024-02-09T10:26:33.738280335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-a099f8e901,Uid:2691b74587ce28c318c265fe1d19e57b,Namespace:kube-system,Attempt:0,} returns sandbox id \"b629b658924e086033c0cb43cebf33908c2a14c223b6899c2ff657a29fcb95d7\"" Feb 9 10:26:33.741081 env[1350]: time="2024-02-09T10:26:33.741053204Z" level=info msg="CreateContainer within sandbox \"48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6\"" Feb 9 10:26:33.741348 env[1350]: time="2024-02-09T10:26:33.741117555Z" level=info msg="CreateContainer within sandbox \"b629b658924e086033c0cb43cebf33908c2a14c223b6899c2ff657a29fcb95d7\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:26:33.741961 env[1350]: time="2024-02-09T10:26:33.741925807Z" level=info msg="StartContainer for \"42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6\"" Feb 9 10:26:33.764236 systemd[1]: Started cri-containerd-42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6.scope. Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit: BPF prog-id=74 op=LOAD Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666634393831353362653936313934633862303334373933623866 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666634393831353362653936313934633862303334373933623866 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit: BPF prog-id=75 op=LOAD Feb 9 10:26:33.781000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666634393831353362653936313934633862303334373933623866 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit: BPF prog-id=76 op=LOAD Feb 9 10:26:33.781000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666634393831353362653936313934633862303334373933623866 Feb 9 10:26:33.781000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:26:33.781000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.781000 audit: BPF prog-id=77 op=LOAD Feb 9 10:26:33.781000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666634393831353362653936313934633862303334373933623866 Feb 9 10:26:33.815886 env[1350]: time="2024-02-09T10:26:33.815822625Z" level=info msg="StartContainer for \"42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6\" returns successfully" Feb 9 10:26:33.839908 env[1350]: time="2024-02-09T10:26:33.839859125Z" level=info msg="CreateContainer within sandbox \"8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97\"" Feb 9 10:26:33.840560 env[1350]: time="2024-02-09T10:26:33.840525395Z" level=info msg="StartContainer for \"4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97\"" Feb 9 10:26:33.860984 systemd[1]: Started cri-containerd-4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97.scope. Feb 9 10:26:33.863815 env[1350]: time="2024-02-09T10:26:33.863773281Z" level=info msg="CreateContainer within sandbox \"b629b658924e086033c0cb43cebf33908c2a14c223b6899c2ff657a29fcb95d7\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9e20e1c1a2dd27c2434d42099d6fb6644abd8956976b02191db1c1cbdb290990\"" Feb 9 10:26:33.866189 env[1350]: time="2024-02-09T10:26:33.866163800Z" level=info msg="StartContainer for \"9e20e1c1a2dd27c2434d42099d6fb6644abd8956976b02191db1c1cbdb290990\"" Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.874000 audit: BPF prog-id=78 op=LOAD Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343762313439346631316363303939666635663435336537333965 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343762313439346631316363303939666635663435336537333965 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit: BPF prog-id=79 op=LOAD Feb 9 10:26:33.875000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343762313439346631316363303939666635663435336537333965 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit: BPF prog-id=80 op=LOAD Feb 9 10:26:33.875000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343762313439346631316363303939666635663435336537333965 Feb 9 10:26:33.875000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:26:33.875000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.875000 audit: BPF prog-id=81 op=LOAD Feb 9 10:26:33.875000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343762313439346631316363303939666635663435336537333965 Feb 9 10:26:33.894489 systemd[1]: Started cri-containerd-9e20e1c1a2dd27c2434d42099d6fb6644abd8956976b02191db1c1cbdb290990.scope. Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.918000 audit: BPF prog-id=82 op=LOAD Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2223 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323065316331613264643237633234333464343230393964366662 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2223 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323065316331613264643237633234333464343230393964366662 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit: BPF prog-id=83 op=LOAD Feb 9 10:26:33.919000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2223 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323065316331613264643237633234333464343230393964366662 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit: BPF prog-id=84 op=LOAD Feb 9 10:26:33.919000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2223 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323065316331613264643237633234333464343230393964366662 Feb 9 10:26:33.919000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:26:33.919000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:33.919000 audit: BPF prog-id=85 op=LOAD Feb 9 10:26:33.919000 audit[2356]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2223 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:33.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323065316331613264643237633234333464343230393964366662 Feb 9 10:26:33.931134 env[1350]: time="2024-02-09T10:26:33.931092060Z" level=info msg="StartContainer for \"4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97\" returns successfully" Feb 9 10:26:33.953088 env[1350]: time="2024-02-09T10:26:33.953041320Z" level=info msg="StartContainer for \"9e20e1c1a2dd27c2434d42099d6fb6644abd8956976b02191db1c1cbdb290990\" returns successfully" Feb 9 10:26:35.108521 kubelet[2089]: I0209 10:26:35.108489 2089 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:35.741580 kernel: kauditd_printk_skb: 620 callbacks suppressed Feb 9 10:26:35.735000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:35.736000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:35.794918 kernel: audit: type=1400 audit(1707474395.735:707): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:35.795015 kernel: audit: type=1400 audit(1707474395.736:708): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:35.736000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c347e0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:35.830853 kernel: audit: type=1300 audit(1707474395.736:708): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c347e0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:35.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:35.855605 kernel: audit: type=1327 audit(1707474395.736:708): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:35.735000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003b94d0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:35.889903 kernel: audit: type=1300 audit(1707474395.735:707): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003b94d0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:35.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:35.914628 kernel: audit: type=1327 audit(1707474395.735:707): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:36.683000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.683000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4004044000 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.754601 kernel: audit: type=1400 audit(1707474396.683:709): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.754749 kernel: audit: type=1300 audit(1707474396.683:709): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4004044000 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.683000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.809416 kernel: audit: type=1327 audit(1707474396.683:709): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.692000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.840483 kernel: audit: type=1400 audit(1707474396.692:710): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.692000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4001fba460 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.706000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.706000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40040444e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.706000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.709000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.709000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=58 a1=40028a3170 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.709000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.712000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.712000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4002b7a520 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.721000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:36.721000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40028a35c0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:26:36.721000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:26:36.985073 kubelet[2089]: I0209 10:26:36.985030 2089 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:36.993240 kubelet[2089]: I0209 10:26:36.993201 2089 apiserver.go:52] "Watching apiserver" Feb 9 10:26:37.099444 kubelet[2089]: I0209 10:26:37.099400 2089 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:26:37.121702 kubelet[2089]: E0209 10:26:37.121579 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b5bc9579", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 991620985, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 991620985, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.139126 kubelet[2089]: I0209 10:26:37.139087 2089 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:26:37.282898 kubelet[2089]: E0209 10:26:37.282713 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b5ece5bb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 994787259, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 31, 994787259, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.339047 kubelet[2089]: E0209 10:26:37.338902 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83ab976", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33442166, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33442166, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.393361 kubelet[2089]: E0209 10:26:37.393268 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83accfd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33447165, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33447165, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.451552 kubelet[2089]: E0209 10:26:37.451457 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83ad815", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33450005, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33450005, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.505848 kubelet[2089]: E0209 10:26:37.505729 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9ba3aef31", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 67010353, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 67010353, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.561436 kubelet[2089]: E0209 10:26:37.561262 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83ab976", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33442166, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 99954906, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.617778 kubelet[2089]: E0209 10:26:37.617644 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83accfd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33447165, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 99961265, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.673873 kubelet[2089]: E0209 10:26:37.673760 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83ad815", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33450005, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 99969864, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:37.774903 kubelet[2089]: E0209 10:26:37.774787 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83ab976", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33442166, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 302293460, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:38.176112 kubelet[2089]: E0209 10:26:38.175987 2089 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-a099f8e901.17b22ae9b83accfd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-a099f8e901", UID:"ci-3510.3.2-a-a099f8e901", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-a099f8e901 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 33447165, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 26, 32, 302299219, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:26:39.346749 systemd[1]: Reloading. Feb 9 10:26:39.425136 /usr/lib/systemd/system-generators/torcx-generator[2421]: time="2024-02-09T10:26:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:26:39.425166 /usr/lib/systemd/system-generators/torcx-generator[2421]: time="2024-02-09T10:26:39Z" level=info msg="torcx already run" Feb 9 10:26:39.509774 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:26:39.509957 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:26:39.525880 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:26:39.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.603000 audit: BPF prog-id=86 op=LOAD Feb 9 10:26:39.603000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.605000 audit: BPF prog-id=87 op=LOAD Feb 9 10:26:39.605000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:26:39.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit: BPF prog-id=88 op=LOAD Feb 9 10:26:39.606000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit: BPF prog-id=89 op=LOAD Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.607000 audit: BPF prog-id=90 op=LOAD Feb 9 10:26:39.607000 audit: BPF prog-id=49 op=UNLOAD Feb 9 10:26:39.607000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.608000 audit: BPF prog-id=91 op=LOAD Feb 9 10:26:39.609000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.609000 audit: BPF prog-id=92 op=LOAD Feb 9 10:26:39.610000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit: BPF prog-id=93 op=LOAD Feb 9 10:26:39.611000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit: BPF prog-id=94 op=LOAD Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.612000 audit: BPF prog-id=95 op=LOAD Feb 9 10:26:39.612000 audit: BPF prog-id=52 op=UNLOAD Feb 9 10:26:39.612000 audit: BPF prog-id=53 op=UNLOAD Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.613000 audit: BPF prog-id=96 op=LOAD Feb 9 10:26:39.613000 audit: BPF prog-id=70 op=UNLOAD Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.614000 audit: BPF prog-id=97 op=LOAD Feb 9 10:26:39.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.615000 audit: BPF prog-id=98 op=LOAD Feb 9 10:26:39.615000 audit: BPF prog-id=54 op=UNLOAD Feb 9 10:26:39.615000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.617000 audit: BPF prog-id=99 op=LOAD Feb 9 10:26:39.617000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:26:39.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.618000 audit: BPF prog-id=100 op=LOAD Feb 9 10:26:39.618000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:26:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.619000 audit: BPF prog-id=101 op=LOAD Feb 9 10:26:39.619000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit: BPF prog-id=102 op=LOAD Feb 9 10:26:39.622000 audit: BPF prog-id=82 op=UNLOAD Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit: BPF prog-id=103 op=LOAD Feb 9 10:26:39.623000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit: BPF prog-id=104 op=LOAD Feb 9 10:26:39.623000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit: BPF prog-id=105 op=LOAD Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.623000 audit: BPF prog-id=106 op=LOAD Feb 9 10:26:39.623000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:26:39.623000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:26:39.641574 kubelet[2089]: I0209 10:26:39.641404 2089 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:26:39.642198 systemd[1]: Stopping kubelet.service... Feb 9 10:26:39.659042 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:26:39.659384 systemd[1]: Stopped kubelet.service. Feb 9 10:26:39.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:39.659621 systemd[1]: kubelet.service: Consumed 1.533s CPU time. Feb 9 10:26:39.662154 systemd[1]: Started kubelet.service. Feb 9 10:26:39.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:39.727447 kubelet[2478]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:26:39.727808 kubelet[2478]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:26:39.727939 kubelet[2478]: I0209 10:26:39.727908 2478 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:26:39.729289 kubelet[2478]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:26:39.729545 kubelet[2478]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:26:39.732840 kubelet[2478]: I0209 10:26:39.732811 2478 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:26:39.732998 kubelet[2478]: I0209 10:26:39.732987 2478 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:26:39.733291 kubelet[2478]: I0209 10:26:39.733274 2478 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:26:39.734741 kubelet[2478]: I0209 10:26:39.734716 2478 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:26:39.735875 kubelet[2478]: I0209 10:26:39.735837 2478 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:26:39.738133 kubelet[2478]: W0209 10:26:39.738113 2478 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:26:39.738884 kubelet[2478]: I0209 10:26:39.738866 2478 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:26:39.739192 kubelet[2478]: I0209 10:26:39.739177 2478 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:26:39.739366 kubelet[2478]: I0209 10:26:39.739340 2478 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:26:39.739494 kubelet[2478]: I0209 10:26:39.739482 2478 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:26:39.739560 kubelet[2478]: I0209 10:26:39.739551 2478 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:26:39.739646 kubelet[2478]: I0209 10:26:39.739637 2478 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:26:39.746135 kubelet[2478]: I0209 10:26:39.746103 2478 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:26:39.746135 kubelet[2478]: I0209 10:26:39.746132 2478 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:26:39.746292 kubelet[2478]: I0209 10:26:39.746158 2478 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:26:39.746292 kubelet[2478]: I0209 10:26:39.746170 2478 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:26:39.751536 kubelet[2478]: I0209 10:26:39.751515 2478 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:26:39.752123 kubelet[2478]: I0209 10:26:39.752100 2478 server.go:1186] "Started kubelet" Feb 9 10:26:39.753000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.753000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:39.753000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b32fc0 a1=4000371e48 a2=4000b32f90 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:39.753000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:39.754175 kubelet[2478]: I0209 10:26:39.754158 2478 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:26:39.753000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.753000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:39.753000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b51a00 a1=4000371e60 a2=4000b33050 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:39.753000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:39.754457 kubelet[2478]: I0209 10:26:39.754446 2478 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:26:39.754531 kubelet[2478]: I0209 10:26:39.754521 2478 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:26:39.757095 kubelet[2478]: I0209 10:26:39.757076 2478 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:26:39.757827 kubelet[2478]: I0209 10:26:39.757807 2478 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:26:39.760100 kubelet[2478]: I0209 10:26:39.760076 2478 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:26:39.761481 kubelet[2478]: I0209 10:26:39.761461 2478 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:26:39.775277 kubelet[2478]: I0209 10:26:39.775251 2478 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:26:39.784723 kubelet[2478]: E0209 10:26:39.783353 2478 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:26:39.784723 kubelet[2478]: E0209 10:26:39.783393 2478 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:26:39.826954 kubelet[2478]: I0209 10:26:39.826928 2478 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:26:39.827118 kubelet[2478]: I0209 10:26:39.827107 2478 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:26:39.827193 kubelet[2478]: I0209 10:26:39.827183 2478 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:26:39.827295 kubelet[2478]: E0209 10:26:39.827286 2478 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:26:39.872825 kubelet[2478]: I0209 10:26:39.872712 2478 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:39.897100 kubelet[2478]: I0209 10:26:39.897053 2478 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:39.897243 kubelet[2478]: I0209 10:26:39.897157 2478 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-a099f8e901" Feb 9 10:26:39.928722 kubelet[2478]: E0209 10:26:39.927416 2478 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 10:26:39.944540 kubelet[2478]: I0209 10:26:39.944483 2478 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:26:39.944540 kubelet[2478]: I0209 10:26:39.944505 2478 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:26:39.944540 kubelet[2478]: I0209 10:26:39.944525 2478 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:26:39.944740 kubelet[2478]: I0209 10:26:39.944670 2478 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:26:39.944740 kubelet[2478]: I0209 10:26:39.944683 2478 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 10:26:39.944740 kubelet[2478]: I0209 10:26:39.944729 2478 policy_none.go:49] "None policy: Start" Feb 9 10:26:39.947071 kubelet[2478]: I0209 10:26:39.947035 2478 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:26:39.947071 kubelet[2478]: I0209 10:26:39.947065 2478 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:26:39.947258 kubelet[2478]: I0209 10:26:39.947235 2478 state_mem.go:75] "Updated machine memory state" Feb 9 10:26:39.950877 kubelet[2478]: I0209 10:26:39.950844 2478 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:26:39.950984 kubelet[2478]: I0209 10:26:39.950908 2478 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:26:39.950000 audit[2478]: AVC avc: denied { mac_admin } for pid=2478 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:39.950000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:26:39.950000 audit[2478]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f95bf0 a1=4000f15ad0 a2=4000f95bc0 a3=25 items=0 ppid=1 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:39.950000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:26:39.952371 kubelet[2478]: I0209 10:26:39.951760 2478 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:26:40.127945 kubelet[2478]: I0209 10:26:40.127813 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:40.127945 kubelet[2478]: I0209 10:26:40.127917 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:40.127945 kubelet[2478]: I0209 10:26:40.127949 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:40.143834 kubelet[2478]: E0209 10:26:40.143798 2478 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164381 kubelet[2478]: I0209 10:26:40.164349 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164381 kubelet[2478]: I0209 10:26:40.164391 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164545 kubelet[2478]: I0209 10:26:40.164413 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/35db51d4b6ee07609dec0ef9679fe250-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-a099f8e901\" (UID: \"35db51d4b6ee07609dec0ef9679fe250\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164545 kubelet[2478]: I0209 10:26:40.164435 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164545 kubelet[2478]: I0209 10:26:40.164457 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164545 kubelet[2478]: I0209 10:26:40.164476 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164545 kubelet[2478]: I0209 10:26:40.164495 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2691b74587ce28c318c265fe1d19e57b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" (UID: \"2691b74587ce28c318c265fe1d19e57b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164664 kubelet[2478]: I0209 10:26:40.164518 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.164664 kubelet[2478]: I0209 10:26:40.164539 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e332ed3eea3db1a830fe72beea5a9326-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" (UID: \"e332ed3eea3db1a830fe72beea5a9326\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:40.751941 kubelet[2478]: I0209 10:26:40.751906 2478 apiserver.go:52] "Watching apiserver" Feb 9 10:26:40.762030 kubelet[2478]: I0209 10:26:40.761998 2478 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:26:40.767750 kubelet[2478]: I0209 10:26:40.767722 2478 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:26:40.998672 kubelet[2478]: E0209 10:26:40.998631 2478 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-a099f8e901\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:41.386257 kubelet[2478]: E0209 10:26:41.386214 2478 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-a099f8e901\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:41.400720 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 10:26:41.400861 kernel: audit: type=1400 audit(1707474401.390:964): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.390000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.390000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001051ea0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.486143 kernel: audit: type=1300 audit(1707474401.390:964): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001051ea0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.486253 kernel: audit: type=1327 audit(1707474401.390:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.390000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.516217 kernel: audit: type=1400 audit(1707474401.390:965): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.516312 kernel: audit: type=1300 audit(1707474401.390:965): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001051fe0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.390000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001051fe0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.570631 kernel: audit: type=1327 audit(1707474401.390:965): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.572081 kubelet[2478]: E0209 10:26:41.572055 2478 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-a099f8e901\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" Feb 9 10:26:41.391000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.595076 kernel: audit: type=1400 audit(1707474401.391:966): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.391000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c34120 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.625665 kernel: audit: type=1300 audit(1707474401.391:966): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c34120 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.651342 kernel: audit: type=1327 audit(1707474401.391:966): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:41.651510 kernel: audit: type=1400 audit(1707474401.403:967): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.403000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:26:41.403000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400085d2c0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:41.403000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:42.163750 kubelet[2478]: I0209 10:26:42.163720 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-a099f8e901" podStartSLOduration=4.163655089 pod.CreationTimestamp="2024-02-09 10:26:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:26:41.839640111 +0000 UTC m=+2.172877686" watchObservedRunningTime="2024-02-09 10:26:42.163655089 +0000 UTC m=+2.496892704" Feb 9 10:26:42.552105 kubelet[2478]: I0209 10:26:42.552069 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-a099f8e901" podStartSLOduration=2.5520302409999998 pod.CreationTimestamp="2024-02-09 10:26:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:26:42.164340695 +0000 UTC m=+2.497578310" watchObservedRunningTime="2024-02-09 10:26:42.552030241 +0000 UTC m=+2.885267816" Feb 9 10:26:43.232618 kubelet[2478]: I0209 10:26:43.232590 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-a099f8e901" podStartSLOduration=3.232546074 pod.CreationTimestamp="2024-02-09 10:26:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:26:42.552580502 +0000 UTC m=+2.885818117" watchObservedRunningTime="2024-02-09 10:26:43.232546074 +0000 UTC m=+3.565783689" Feb 9 10:26:43.617317 sudo[1688]: pam_unix(sudo:session): session closed for user root Feb 9 10:26:43.617000 audit[1688]: USER_END pid=1688 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:43.617000 audit[1688]: CRED_DISP pid=1688 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:26:43.695065 sshd[1685]: pam_unix(sshd:session): session closed for user core Feb 9 10:26:43.695000 audit[1685]: USER_END pid=1685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:43.695000 audit[1685]: CRED_DISP pid=1685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:26:43.698267 systemd[1]: sshd@6-10.200.20.12:22-10.200.12.6:48024.service: Deactivated successfully. Feb 9 10:26:43.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:26:43.699082 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:26:43.699272 systemd[1]: session-9.scope: Consumed 6.246s CPU time. Feb 9 10:26:43.699921 systemd-logind[1338]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:26:43.700923 systemd-logind[1338]: Removed session 9. Feb 9 10:26:51.799744 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:26:51.799919 kernel: audit: type=1400 audit(1707474411.784:973): avc: denied { watch } for pid=2308 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:26:51.784000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:26:51.784000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001199280 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:51.843142 kernel: audit: type=1300 audit(1707474411.784:973): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001199280 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:26:51.784000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:51.868168 kernel: audit: type=1327 audit(1707474411.784:973): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:26:52.995962 kubelet[2478]: I0209 10:26:52.995919 2478 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 10:26:52.996623 env[1350]: time="2024-02-09T10:26:52.996579988Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:26:52.997128 kubelet[2478]: I0209 10:26:52.997112 2478 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 10:26:53.657848 kubelet[2478]: I0209 10:26:53.657803 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:53.662467 systemd[1]: Created slice kubepods-besteffort-pod64be6473_3e49_421b_aa33_990d882297ad.slice. Feb 9 10:26:53.731991 kubelet[2478]: I0209 10:26:53.731953 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/64be6473-3e49-421b-aa33-990d882297ad-kube-proxy\") pod \"kube-proxy-9wkwh\" (UID: \"64be6473-3e49-421b-aa33-990d882297ad\") " pod="kube-system/kube-proxy-9wkwh" Feb 9 10:26:53.731991 kubelet[2478]: I0209 10:26:53.731997 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/64be6473-3e49-421b-aa33-990d882297ad-xtables-lock\") pod \"kube-proxy-9wkwh\" (UID: \"64be6473-3e49-421b-aa33-990d882297ad\") " pod="kube-system/kube-proxy-9wkwh" Feb 9 10:26:53.732172 kubelet[2478]: I0209 10:26:53.732031 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/64be6473-3e49-421b-aa33-990d882297ad-lib-modules\") pod \"kube-proxy-9wkwh\" (UID: \"64be6473-3e49-421b-aa33-990d882297ad\") " pod="kube-system/kube-proxy-9wkwh" Feb 9 10:26:53.732172 kubelet[2478]: I0209 10:26:53.732053 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7v8m2\" (UniqueName: \"kubernetes.io/projected/64be6473-3e49-421b-aa33-990d882297ad-kube-api-access-7v8m2\") pod \"kube-proxy-9wkwh\" (UID: \"64be6473-3e49-421b-aa33-990d882297ad\") " pod="kube-system/kube-proxy-9wkwh" Feb 9 10:26:53.929507 kubelet[2478]: I0209 10:26:53.929382 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:26:53.934172 systemd[1]: Created slice kubepods-besteffort-pod37e88876_9ecd_4d87_99da_eaa6109dbd89.slice. Feb 9 10:26:53.970178 env[1350]: time="2024-02-09T10:26:53.970125344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9wkwh,Uid:64be6473-3e49-421b-aa33-990d882297ad,Namespace:kube-system,Attempt:0,}" Feb 9 10:26:54.009209 env[1350]: time="2024-02-09T10:26:54.009132283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:26:54.009209 env[1350]: time="2024-02-09T10:26:54.009179440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:26:54.009587 env[1350]: time="2024-02-09T10:26:54.009195238Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:26:54.009720 env[1350]: time="2024-02-09T10:26:54.009641842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585 pid=2581 runtime=io.containerd.runc.v2 Feb 9 10:26:54.024709 systemd[1]: Started cri-containerd-196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585.scope. Feb 9 10:26:54.033819 kubelet[2478]: I0209 10:26:54.033720 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jbm42\" (UniqueName: \"kubernetes.io/projected/37e88876-9ecd-4d87-99da-eaa6109dbd89-kube-api-access-jbm42\") pod \"tigera-operator-cfc98749c-mgslp\" (UID: \"37e88876-9ecd-4d87-99da-eaa6109dbd89\") " pod="tigera-operator/tigera-operator-cfc98749c-mgslp" Feb 9 10:26:54.033819 kubelet[2478]: I0209 10:26:54.033762 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/37e88876-9ecd-4d87-99da-eaa6109dbd89-var-lib-calico\") pod \"tigera-operator-cfc98749c-mgslp\" (UID: \"37e88876-9ecd-4d87-99da-eaa6109dbd89\") " pod="tigera-operator/tigera-operator-cfc98749c-mgslp" Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075567 kernel: audit: type=1400 audit(1707474414.040:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075738 kernel: audit: type=1400 audit(1707474414.040:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.093017 kernel: audit: type=1400 audit(1707474414.040:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.110100 kernel: audit: type=1400 audit(1707474414.040:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.110625 kernel: audit: type=1400 audit(1707474414.040:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.144906 kernel: audit: type=1400 audit(1707474414.040:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.167029 kernel: audit: type=1400 audit(1707474414.040:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.040000 audit: BPF prog-id=107 op=LOAD Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366438373261393163663063646637633231646238316462393432 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366438373261393163663063646637633231646238316462393432 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.042000 audit: BPF prog-id=108 op=LOAD Feb 9 10:26:54.042000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366438373261393163663063646637633231646238316462393432 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.067000 audit: BPF prog-id=109 op=LOAD Feb 9 10:26:54.067000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366438373261393163663063646637633231646238316462393432 Feb 9 10:26:54.075000 audit: BPF prog-id=109 op=UNLOAD Feb 9 10:26:54.075000 audit: BPF prog-id=108 op=UNLOAD Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.075000 audit: BPF prog-id=110 op=LOAD Feb 9 10:26:54.075000 audit[2591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366438373261393163663063646637633231646238316462393432 Feb 9 10:26:54.172511 env[1350]: time="2024-02-09T10:26:54.172476254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9wkwh,Uid:64be6473-3e49-421b-aa33-990d882297ad,Namespace:kube-system,Attempt:0,} returns sandbox id \"196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585\"" Feb 9 10:26:54.175830 env[1350]: time="2024-02-09T10:26:54.175789262Z" level=info msg="CreateContainer within sandbox \"196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:26:54.221408 env[1350]: time="2024-02-09T10:26:54.221365715Z" level=info msg="CreateContainer within sandbox \"196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ce8727fd5eaff2fa3ba6a21a6dd18f9d3a5e39dcbef4867f375e2e052d0714cf\"" Feb 9 10:26:54.223392 env[1350]: time="2024-02-09T10:26:54.222099174Z" level=info msg="StartContainer for \"ce8727fd5eaff2fa3ba6a21a6dd18f9d3a5e39dcbef4867f375e2e052d0714cf\"" Feb 9 10:26:54.236993 systemd[1]: Started cri-containerd-ce8727fd5eaff2fa3ba6a21a6dd18f9d3a5e39dcbef4867f375e2e052d0714cf.scope. Feb 9 10:26:54.240301 env[1350]: time="2024-02-09T10:26:54.240158569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-mgslp,Uid:37e88876-9ecd-4d87-99da-eaa6109dbd89,Namespace:tigera-operator,Attempt:0,}" Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2581 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383732376664356561666632666133626136613231613664643138 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.253000 audit: BPF prog-id=111 op=LOAD Feb 9 10:26:54.253000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2581 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383732376664356561666632666133626136613231613664643138 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.254000 audit: BPF prog-id=112 op=LOAD Feb 9 10:26:54.254000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2581 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383732376664356561666632666133626136613231613664643138 Feb 9 10:26:54.254000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:26:54.255000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.255000 audit: BPF prog-id=113 op=LOAD Feb 9 10:26:54.255000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2581 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383732376664356561666632666133626136613231613664643138 Feb 9 10:26:54.272864 env[1350]: time="2024-02-09T10:26:54.272823884Z" level=info msg="StartContainer for \"ce8727fd5eaff2fa3ba6a21a6dd18f9d3a5e39dcbef4867f375e2e052d0714cf\" returns successfully" Feb 9 10:26:54.286412 env[1350]: time="2024-02-09T10:26:54.285791378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:26:54.286567 env[1350]: time="2024-02-09T10:26:54.286380009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:26:54.286567 env[1350]: time="2024-02-09T10:26:54.286392568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:26:54.286799 env[1350]: time="2024-02-09T10:26:54.286762058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3 pid=2660 runtime=io.containerd.runc.v2 Feb 9 10:26:54.298486 systemd[1]: Started cri-containerd-618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3.scope. Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.319000 audit: BPF prog-id=114 op=LOAD Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2660 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631386265613861326565656666323731323831633635366638643761 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2660 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631386265613861326565656666323731323831633635366638643761 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.320000 audit: BPF prog-id=115 op=LOAD Feb 9 10:26:54.320000 audit[2671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2660 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631386265613861326565656666323731323831633635366638643761 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.321000 audit: BPF prog-id=116 op=LOAD Feb 9 10:26:54.321000 audit[2671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2660 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631386265613861326565656666323731323831633635366638643761 Feb 9 10:26:54.322000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:26:54.322000 audit: BPF prog-id=115 op=UNLOAD Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:54.322000 audit: BPF prog-id=117 op=LOAD Feb 9 10:26:54.322000 audit[2671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2660 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631386265613861326565656666323731323831633635366638643761 Feb 9 10:26:54.340000 audit[2718]: NETFILTER_CFG table=mangle:62 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.340000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffedddf1e0 a2=0 a3=ffffaeb546c0 items=0 ppid=2634 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:26:54.348000 audit[2719]: NETFILTER_CFG table=mangle:63 family=10 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.348000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecf12b80 a2=0 a3=ffffb02166c0 items=0 ppid=2634 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:26:54.349000 audit[2720]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.349000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc0186a0 a2=0 a3=ffffb810f6c0 items=0 ppid=2634 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:26:54.351724 env[1350]: time="2024-02-09T10:26:54.351654283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-mgslp,Uid:37e88876-9ecd-4d87-99da-eaa6109dbd89,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3\"" Feb 9 10:26:54.353641 env[1350]: time="2024-02-09T10:26:54.353614802Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 10:26:54.355000 audit[2721]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.355000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc943be0 a2=0 a3=ffffbf0156c0 items=0 ppid=2634 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:26:54.356000 audit[2722]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.356000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0872bb0 a2=0 a3=ffffb12036c0 items=0 ppid=2634 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:26:54.358000 audit[2723]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.358000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc83f9130 a2=0 a3=ffff92b866c0 items=0 ppid=2634 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:26:54.442000 audit[2724]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.442000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe2840cf0 a2=0 a3=ffff7f7586c0 items=0 ppid=2634 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:26:54.444000 audit[2726]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.444000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdbbc9700 a2=0 a3=ffffadf976c0 items=0 ppid=2634 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:26:54.447000 audit[2729]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.447000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffb1dfd90 a2=0 a3=ffffa8ec76c0 items=0 ppid=2634 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:26:54.448000 audit[2730]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.448000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5c56870 a2=0 a3=ffff9776b6c0 items=0 ppid=2634 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:26:54.450000 audit[2732]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.450000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff4b23a60 a2=0 a3=ffff9e1a86c0 items=0 ppid=2634 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:26:54.451000 audit[2733]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.451000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe87856d0 a2=0 a3=ffffa7d786c0 items=0 ppid=2634 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:26:54.453000 audit[2735]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.453000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffec5a08c0 a2=0 a3=ffffb01be6c0 items=0 ppid=2634 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:26:54.456000 audit[2738]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.456000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe34a5f00 a2=0 a3=ffffb8eaf6c0 items=0 ppid=2634 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:26:54.457000 audit[2739]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.457000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb860e70 a2=0 a3=ffffbe1a46c0 items=0 ppid=2634 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:26:54.459000 audit[2741]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.459000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcba44700 a2=0 a3=ffff811596c0 items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:26:54.460000 audit[2742]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.460000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffdc80500 a2=0 a3=ffff91bea6c0 items=0 ppid=2634 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:26:54.463000 audit[2744]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_rule pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.463000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd56e5a0 a2=0 a3=ffff8a1066c0 items=0 ppid=2634 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:26:54.466000 audit[2747]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.466000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdee74ab0 a2=0 a3=ffffb07166c0 items=0 ppid=2634 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:26:54.469000 audit[2750]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.469000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd53025c0 a2=0 a3=ffff93a526c0 items=0 ppid=2634 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:26:54.470000 audit[2751]: NETFILTER_CFG table=nat:82 family=2 entries=1 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.470000 audit[2751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1042fe0 a2=0 a3=ffff95bcf6c0 items=0 ppid=2634 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:26:54.472000 audit[2753]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.472000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe29d0660 a2=0 a3=ffff927506c0 items=0 ppid=2634 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:26:54.475000 audit[2756]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:26:54.475000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc9ca0e0 a2=0 a3=ffff897696c0 items=0 ppid=2634 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:26:54.578000 audit[2760]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:54.578000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffdaf84410 a2=0 a3=ffff96e116c0 items=0 ppid=2634 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:54.630000 audit[2760]: NETFILTER_CFG table=nat:86 family=2 entries=17 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:54.630000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdaf84410 a2=0 a3=ffff96e116c0 items=0 ppid=2634 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:54.632000 audit[2764]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.632000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffda82c100 a2=0 a3=ffffac92a6c0 items=0 ppid=2634 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:26:54.634000 audit[2766]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.634000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd3557e00 a2=0 a3=ffffa2e916c0 items=0 ppid=2634 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:26:54.638000 audit[2769]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.638000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffda94c300 a2=0 a3=ffff819a76c0 items=0 ppid=2634 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:26:54.639000 audit[2770]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.639000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc50ec90 a2=0 a3=ffffb00f56c0 items=0 ppid=2634 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:26:54.641000 audit[2772]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.641000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc7582b0 a2=0 a3=ffff88fd56c0 items=0 ppid=2634 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:26:54.642000 audit[2773]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.642000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb6f1770 a2=0 a3=ffff80d3c6c0 items=0 ppid=2634 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:26:54.644000 audit[2775]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.644000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc8a74190 a2=0 a3=ffffab5356c0 items=0 ppid=2634 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:26:54.647000 audit[2778]: NETFILTER_CFG table=filter:94 family=10 entries=2 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.647000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd282a220 a2=0 a3=ffff8907c6c0 items=0 ppid=2634 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:26:54.648000 audit[2779]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.648000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffbdfe90 a2=0 a3=ffffa83e16c0 items=0 ppid=2634 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:26:54.652000 audit[2781]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.652000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff5c1d8a0 a2=0 a3=ffffa18f06c0 items=0 ppid=2634 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:26:54.654000 audit[2782]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.654000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1ec3630 a2=0 a3=ffffa87a36c0 items=0 ppid=2634 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:26:54.657000 audit[2784]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.657000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0d624e0 a2=0 a3=ffffbdc0b6c0 items=0 ppid=2634 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:26:54.660000 audit[2787]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.660000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc0db240 a2=0 a3=ffffa76d16c0 items=0 ppid=2634 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:26:54.663000 audit[2790]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.663000 audit[2790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0550390 a2=0 a3=ffffb27486c0 items=0 ppid=2634 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:26:54.664000 audit[2791]: NETFILTER_CFG table=nat:101 family=10 entries=1 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.664000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6f4ae90 a2=0 a3=ffff919216c0 items=0 ppid=2634 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:26:54.666000 audit[2793]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.666000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe672fec0 a2=0 a3=ffff9447f6c0 items=0 ppid=2634 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:26:54.669000 audit[2796]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:26:54.669000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdd789f80 a2=0 a3=ffffb39c66c0 items=0 ppid=2634 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:26:54.674000 audit[2800]: NETFILTER_CFG table=filter:104 family=10 entries=3 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:26:54.674000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffdab8750 a2=0 a3=ffff8ae106c0 items=0 ppid=2634 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.674000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:54.674000 audit[2800]: NETFILTER_CFG table=nat:105 family=10 entries=10 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:26:54.674000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffffdab8750 a2=0 a3=ffff8ae106c0 items=0 ppid=2634 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:54.674000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:54.846364 systemd[1]: run-containerd-runc-k8s.io-196d872a91cf0cdf7c21db81db942f5b1e54f646be11b229e87874a881202585-runc.MLa2p4.mount: Deactivated successfully. Feb 9 10:26:55.919928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4101812468.mount: Deactivated successfully. Feb 9 10:26:56.643799 env[1350]: time="2024-02-09T10:26:56.643757622Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:56.652946 env[1350]: time="2024-02-09T10:26:56.652912220Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:56.659949 env[1350]: time="2024-02-09T10:26:56.658273397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:56.665636 env[1350]: time="2024-02-09T10:26:56.665603379Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:26:56.666326 env[1350]: time="2024-02-09T10:26:56.666291725Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 10:26:56.670238 env[1350]: time="2024-02-09T10:26:56.670203056Z" level=info msg="CreateContainer within sandbox \"618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 10:26:56.699341 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1969203301.mount: Deactivated successfully. Feb 9 10:26:56.719828 env[1350]: time="2024-02-09T10:26:56.719783107Z" level=info msg="CreateContainer within sandbox \"618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172\"" Feb 9 10:26:56.720939 env[1350]: time="2024-02-09T10:26:56.720899259Z" level=info msg="StartContainer for \"300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172\"" Feb 9 10:26:56.735937 systemd[1]: Started cri-containerd-300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172.scope. Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit: BPF prog-id=118 op=LOAD Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2660 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:56.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330306265336365303132323931306436663733353261353661633738 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2660 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:56.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330306265336365303132323931306436663733353261353661633738 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.746000 audit: BPF prog-id=119 op=LOAD Feb 9 10:26:56.746000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2660 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:56.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330306265336365303132323931306436663733353261353661633738 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit: BPF prog-id=120 op=LOAD Feb 9 10:26:56.747000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2660 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:56.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330306265336365303132323931306436663733353261353661633738 Feb 9 10:26:56.747000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:26:56.747000 audit: BPF prog-id=119 op=UNLOAD Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:26:56.747000 audit: BPF prog-id=121 op=LOAD Feb 9 10:26:56.747000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2660 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:56.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330306265336365303132323931306436663733353261353661633738 Feb 9 10:26:56.766510 env[1350]: time="2024-02-09T10:26:56.766464746Z" level=info msg="StartContainer for \"300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172\" returns successfully" Feb 9 10:26:56.877114 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount184005799.mount: Deactivated successfully. Feb 9 10:26:56.937323 kubelet[2478]: I0209 10:26:56.936345 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9wkwh" podStartSLOduration=3.936303873 pod.CreationTimestamp="2024-02-09 10:26:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:26:54.92080177 +0000 UTC m=+15.254039385" watchObservedRunningTime="2024-02-09 10:26:56.936303873 +0000 UTC m=+17.269541488" Feb 9 10:26:59.755000 audit[2863]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.761070 kernel: kauditd_printk_skb: 339 callbacks suppressed Feb 9 10:26:59.761129 kernel: audit: type=1325 audit(1707474419.755:1078): table=filter:106 family=2 entries=13 op=nft_register_rule pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.755000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffff86eda70 a2=0 a3=ffff84dba6c0 items=0 ppid=2634 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.802297 kernel: audit: type=1300 audit(1707474419.755:1078): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffff86eda70 a2=0 a3=ffff84dba6c0 items=0 ppid=2634 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.815748 kernel: audit: type=1327 audit(1707474419.755:1078): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.755000 audit[2863]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.832348 kernel: audit: type=1325 audit(1707474419.755:1079): table=nat:107 family=2 entries=20 op=nft_register_rule pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.755000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff86eda70 a2=0 a3=ffff84dba6c0 items=0 ppid=2634 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.854831 kubelet[2478]: I0209 10:26:59.854800 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-mgslp" podStartSLOduration=-9.223372030000013e+09 pod.CreationTimestamp="2024-02-09 10:26:53 +0000 UTC" firstStartedPulling="2024-02-09 10:26:54.352948296 +0000 UTC m=+14.686185911" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:26:56.936857749 +0000 UTC m=+17.270095364" watchObservedRunningTime="2024-02-09 10:26:59.854762986 +0000 UTC m=+20.188000601" Feb 9 10:26:59.871631 kernel: audit: type=1300 audit(1707474419.755:1079): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff86eda70 a2=0 a3=ffff84dba6c0 items=0 ppid=2634 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.886104 kernel: audit: type=1327 audit(1707474419.755:1079): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.894000 audit[2889]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.894000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd2f71410 a2=0 a3=ffffae8e96c0 items=0 ppid=2634 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.936672 kernel: audit: type=1325 audit(1707474419.894:1080): table=filter:108 family=2 entries=14 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.936790 kernel: audit: type=1300 audit(1707474419.894:1080): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd2f71410 a2=0 a3=ffffae8e96c0 items=0 ppid=2634 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.951963 kernel: audit: type=1327 audit(1707474419.894:1080): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:26:59.894000 audit[2889]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.967949 kernel: audit: type=1325 audit(1707474419.894:1081): table=nat:109 family=2 entries=20 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:26:59.894000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd2f71410 a2=0 a3=ffffae8e96c0 items=0 ppid=2634 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:26:59.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:00.270263 kubelet[2478]: I0209 10:27:00.270220 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:00.275263 systemd[1]: Created slice kubepods-besteffort-pod638ca2d7_4bf6_452f_be5c_3f34ad4279bc.slice. Feb 9 10:27:00.290045 kubelet[2478]: I0209 10:27:00.290018 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/638ca2d7-4bf6-452f-be5c-3f34ad4279bc-typha-certs\") pod \"calico-typha-595f455bc8-65479\" (UID: \"638ca2d7-4bf6-452f-be5c-3f34ad4279bc\") " pod="calico-system/calico-typha-595f455bc8-65479" Feb 9 10:27:00.290252 kubelet[2478]: I0209 10:27:00.290240 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/638ca2d7-4bf6-452f-be5c-3f34ad4279bc-tigera-ca-bundle\") pod \"calico-typha-595f455bc8-65479\" (UID: \"638ca2d7-4bf6-452f-be5c-3f34ad4279bc\") " pod="calico-system/calico-typha-595f455bc8-65479" Feb 9 10:27:00.290382 kubelet[2478]: I0209 10:27:00.290344 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m92zd\" (UniqueName: \"kubernetes.io/projected/638ca2d7-4bf6-452f-be5c-3f34ad4279bc-kube-api-access-m92zd\") pod \"calico-typha-595f455bc8-65479\" (UID: \"638ca2d7-4bf6-452f-be5c-3f34ad4279bc\") " pod="calico-system/calico-typha-595f455bc8-65479" Feb 9 10:27:00.339065 kubelet[2478]: I0209 10:27:00.339032 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:00.343894 systemd[1]: Created slice kubepods-besteffort-pod6b6e2fa2_90a9_4804_b49b_35a967c58472.slice. Feb 9 10:27:00.390947 kubelet[2478]: I0209 10:27:00.390913 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-flexvol-driver-host\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391190 kubelet[2478]: I0209 10:27:00.391177 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxqhn\" (UniqueName: \"kubernetes.io/projected/6b6e2fa2-90a9-4804-b49b-35a967c58472-kube-api-access-nxqhn\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391291 kubelet[2478]: I0209 10:27:00.391280 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-lib-modules\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391394 kubelet[2478]: I0209 10:27:00.391384 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-var-lib-calico\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391472 kubelet[2478]: I0209 10:27:00.391462 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-cni-net-dir\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391549 kubelet[2478]: I0209 10:27:00.391539 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b6e2fa2-90a9-4804-b49b-35a967c58472-tigera-ca-bundle\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391641 kubelet[2478]: I0209 10:27:00.391631 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-var-run-calico\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391741 kubelet[2478]: I0209 10:27:00.391731 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-cni-bin-dir\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391826 kubelet[2478]: I0209 10:27:00.391817 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-cni-log-dir\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391896 kubelet[2478]: I0209 10:27:00.391888 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-policysync\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.391983 kubelet[2478]: I0209 10:27:00.391973 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6b6e2fa2-90a9-4804-b49b-35a967c58472-node-certs\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.392063 kubelet[2478]: I0209 10:27:00.392053 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b6e2fa2-90a9-4804-b49b-35a967c58472-xtables-lock\") pod \"calico-node-jk226\" (UID: \"6b6e2fa2-90a9-4804-b49b-35a967c58472\") " pod="calico-system/calico-node-jk226" Feb 9 10:27:00.463014 kubelet[2478]: I0209 10:27:00.462973 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:00.463811 kubelet[2478]: E0209 10:27:00.463299 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:00.492857 kubelet[2478]: I0209 10:27:00.492820 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/388dce7f-7d7d-4ba3-8cc1-9dce8d294f22-kubelet-dir\") pod \"csi-node-driver-rdvxw\" (UID: \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\") " pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:00.493014 kubelet[2478]: I0209 10:27:00.492909 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/388dce7f-7d7d-4ba3-8cc1-9dce8d294f22-socket-dir\") pod \"csi-node-driver-rdvxw\" (UID: \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\") " pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:00.493014 kubelet[2478]: I0209 10:27:00.492933 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/388dce7f-7d7d-4ba3-8cc1-9dce8d294f22-registration-dir\") pod \"csi-node-driver-rdvxw\" (UID: \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\") " pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:00.493014 kubelet[2478]: I0209 10:27:00.492971 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-24c24\" (UniqueName: \"kubernetes.io/projected/388dce7f-7d7d-4ba3-8cc1-9dce8d294f22-kube-api-access-24c24\") pod \"csi-node-driver-rdvxw\" (UID: \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\") " pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:00.493104 kubelet[2478]: I0209 10:27:00.493076 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/388dce7f-7d7d-4ba3-8cc1-9dce8d294f22-varrun\") pod \"csi-node-driver-rdvxw\" (UID: \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\") " pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:00.494474 kubelet[2478]: E0209 10:27:00.494457 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.494584 kubelet[2478]: W0209 10:27:00.494568 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.494658 kubelet[2478]: E0209 10:27:00.494647 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.494908 kubelet[2478]: E0209 10:27:00.494896 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.494992 kubelet[2478]: W0209 10:27:00.494980 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.495060 kubelet[2478]: E0209 10:27:00.495051 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.495240 kubelet[2478]: E0209 10:27:00.495230 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.495313 kubelet[2478]: W0209 10:27:00.495302 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.495376 kubelet[2478]: E0209 10:27:00.495367 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.495587 kubelet[2478]: E0209 10:27:00.495577 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.495660 kubelet[2478]: W0209 10:27:00.495648 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.495759 kubelet[2478]: E0209 10:27:00.495748 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.502357 kubelet[2478]: E0209 10:27:00.502331 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.502357 kubelet[2478]: W0209 10:27:00.502350 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.502464 kubelet[2478]: E0209 10:27:00.502367 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.594096 kubelet[2478]: E0209 10:27:00.593990 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.594096 kubelet[2478]: W0209 10:27:00.594021 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.594096 kubelet[2478]: E0209 10:27:00.594042 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.594313 kubelet[2478]: E0209 10:27:00.594255 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.594313 kubelet[2478]: W0209 10:27:00.594264 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.594313 kubelet[2478]: E0209 10:27:00.594279 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.595915 kubelet[2478]: E0209 10:27:00.595890 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.595915 kubelet[2478]: W0209 10:27:00.595910 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.595915 kubelet[2478]: E0209 10:27:00.595928 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.596110 kubelet[2478]: E0209 10:27:00.596095 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.596110 kubelet[2478]: W0209 10:27:00.596107 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.596187 kubelet[2478]: E0209 10:27:00.596172 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.596361 kubelet[2478]: E0209 10:27:00.596343 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.596361 kubelet[2478]: W0209 10:27:00.596356 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.596461 kubelet[2478]: E0209 10:27:00.596370 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.596613 kubelet[2478]: E0209 10:27:00.596594 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.596613 kubelet[2478]: W0209 10:27:00.596608 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.596717 kubelet[2478]: E0209 10:27:00.596625 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.596891 kubelet[2478]: E0209 10:27:00.596875 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.596891 kubelet[2478]: W0209 10:27:00.596886 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.597070 kubelet[2478]: E0209 10:27:00.596903 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.597142 kubelet[2478]: E0209 10:27:00.597120 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.597142 kubelet[2478]: W0209 10:27:00.597134 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.597218 kubelet[2478]: E0209 10:27:00.597147 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.597393 kubelet[2478]: E0209 10:27:00.597375 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.597393 kubelet[2478]: W0209 10:27:00.597388 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.597485 kubelet[2478]: E0209 10:27:00.597403 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.597615 kubelet[2478]: E0209 10:27:00.597585 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.597615 kubelet[2478]: W0209 10:27:00.597599 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.597756 kubelet[2478]: E0209 10:27:00.597739 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.597979 kubelet[2478]: E0209 10:27:00.597962 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.597979 kubelet[2478]: W0209 10:27:00.597974 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.598076 kubelet[2478]: E0209 10:27:00.598038 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.598146 kubelet[2478]: E0209 10:27:00.598132 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.598146 kubelet[2478]: W0209 10:27:00.598143 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.598217 kubelet[2478]: E0209 10:27:00.598157 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.598367 kubelet[2478]: E0209 10:27:00.598347 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.598367 kubelet[2478]: W0209 10:27:00.598360 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.598367 kubelet[2478]: E0209 10:27:00.598377 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.598641 kubelet[2478]: E0209 10:27:00.598502 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.598641 kubelet[2478]: W0209 10:27:00.598513 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.598641 kubelet[2478]: E0209 10:27:00.598531 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.598974 kubelet[2478]: E0209 10:27:00.598933 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.598974 kubelet[2478]: W0209 10:27:00.598969 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.599076 kubelet[2478]: E0209 10:27:00.598985 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.599308 kubelet[2478]: E0209 10:27:00.599284 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.599308 kubelet[2478]: W0209 10:27:00.599300 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.599407 kubelet[2478]: E0209 10:27:00.599317 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.600815 kubelet[2478]: E0209 10:27:00.600793 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.600815 kubelet[2478]: W0209 10:27:00.600811 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.600916 kubelet[2478]: E0209 10:27:00.600902 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.601241 kubelet[2478]: E0209 10:27:00.601221 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.601241 kubelet[2478]: W0209 10:27:00.601237 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.601385 kubelet[2478]: E0209 10:27:00.601369 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.601868 kubelet[2478]: E0209 10:27:00.601838 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.601868 kubelet[2478]: W0209 10:27:00.601858 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.602019 kubelet[2478]: E0209 10:27:00.602004 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.602221 kubelet[2478]: E0209 10:27:00.602200 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.602221 kubelet[2478]: W0209 10:27:00.602215 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.602310 kubelet[2478]: E0209 10:27:00.602233 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.602461 kubelet[2478]: E0209 10:27:00.602439 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.602461 kubelet[2478]: W0209 10:27:00.602452 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.602545 kubelet[2478]: E0209 10:27:00.602474 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.602753 kubelet[2478]: E0209 10:27:00.602734 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.602753 kubelet[2478]: W0209 10:27:00.602747 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.602848 kubelet[2478]: E0209 10:27:00.602823 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.602990 kubelet[2478]: E0209 10:27:00.602975 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.602990 kubelet[2478]: W0209 10:27:00.602987 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.603072 kubelet[2478]: E0209 10:27:00.603059 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.603216 kubelet[2478]: E0209 10:27:00.603200 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.603216 kubelet[2478]: W0209 10:27:00.603211 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.603289 kubelet[2478]: E0209 10:27:00.603227 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.603550 kubelet[2478]: E0209 10:27:00.603528 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.603550 kubelet[2478]: W0209 10:27:00.603543 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.603550 kubelet[2478]: E0209 10:27:00.603560 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.603828 kubelet[2478]: E0209 10:27:00.603809 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.603828 kubelet[2478]: W0209 10:27:00.603823 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.603923 kubelet[2478]: E0209 10:27:00.603834 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.604070 kubelet[2478]: E0209 10:27:00.604054 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.604070 kubelet[2478]: W0209 10:27:00.604068 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.604141 kubelet[2478]: E0209 10:27:00.604080 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.700332 kubelet[2478]: E0209 10:27:00.700297 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.700332 kubelet[2478]: W0209 10:27:00.700321 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.700516 kubelet[2478]: E0209 10:27:00.700376 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.700586 kubelet[2478]: E0209 10:27:00.700564 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.700586 kubelet[2478]: W0209 10:27:00.700579 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.700659 kubelet[2478]: E0209 10:27:00.700591 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.700888 kubelet[2478]: E0209 10:27:00.700868 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.700888 kubelet[2478]: W0209 10:27:00.700883 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.700970 kubelet[2478]: E0209 10:27:00.700899 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.801745 kubelet[2478]: E0209 10:27:00.801679 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.801745 kubelet[2478]: W0209 10:27:00.801735 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.801745 kubelet[2478]: E0209 10:27:00.801757 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.802092 kubelet[2478]: E0209 10:27:00.802068 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.802092 kubelet[2478]: W0209 10:27:00.802084 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.802180 kubelet[2478]: E0209 10:27:00.802097 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.802277 kubelet[2478]: E0209 10:27:00.802253 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.802277 kubelet[2478]: W0209 10:27:00.802269 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.802355 kubelet[2478]: E0209 10:27:00.802281 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.903307 kubelet[2478]: E0209 10:27:00.903221 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.903652 kubelet[2478]: W0209 10:27:00.903634 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.903750 kubelet[2478]: E0209 10:27:00.903738 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.906796 kubelet[2478]: E0209 10:27:00.906771 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.906949 kubelet[2478]: W0209 10:27:00.906932 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.907020 kubelet[2478]: E0209 10:27:00.907010 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.907350 kubelet[2478]: E0209 10:27:00.907327 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:00.907438 kubelet[2478]: W0209 10:27:00.907425 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:00.907504 kubelet[2478]: E0209 10:27:00.907494 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:00.999000 audit[2960]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:00.999000 audit[2960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe036a010 a2=0 a3=ffff999556c0 items=0 ppid=2634 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:00.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:01.001000 audit[2960]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:01.001000 audit[2960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe036a010 a2=0 a3=ffff999556c0 items=0 ppid=2634 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:01.008370 kubelet[2478]: E0209 10:27:01.008339 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.008370 kubelet[2478]: W0209 10:27:01.008363 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.008536 kubelet[2478]: E0209 10:27:01.008385 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.008728 kubelet[2478]: E0209 10:27:01.008705 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.008728 kubelet[2478]: W0209 10:27:01.008721 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.008813 kubelet[2478]: E0209 10:27:01.008734 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.008985 kubelet[2478]: E0209 10:27:01.008960 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.008985 kubelet[2478]: W0209 10:27:01.008978 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.009065 kubelet[2478]: E0209 10:27:01.008991 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.052443 kubelet[2478]: E0209 10:27:01.052404 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.052443 kubelet[2478]: W0209 10:27:01.052430 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.052443 kubelet[2478]: E0209 10:27:01.052451 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.110248 kubelet[2478]: E0209 10:27:01.110215 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.110419 kubelet[2478]: W0209 10:27:01.110403 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.110491 kubelet[2478]: E0209 10:27:01.110481 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.110829 kubelet[2478]: E0209 10:27:01.110816 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.110917 kubelet[2478]: W0209 10:27:01.110905 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.110994 kubelet[2478]: E0209 10:27:01.110984 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.179912 env[1350]: time="2024-02-09T10:27:01.179474703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-595f455bc8-65479,Uid:638ca2d7-4bf6-452f-be5c-3f34ad4279bc,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:01.215822 kubelet[2478]: E0209 10:27:01.215800 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.216008 kubelet[2478]: W0209 10:27:01.215991 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.216106 kubelet[2478]: E0209 10:27:01.216095 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.218815 kubelet[2478]: E0209 10:27:01.218796 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.219420 kubelet[2478]: W0209 10:27:01.219399 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.219649 kubelet[2478]: E0209 10:27:01.219635 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.222383 env[1350]: time="2024-02-09T10:27:01.222295368Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:01.222504 env[1350]: time="2024-02-09T10:27:01.222391802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:01.222504 env[1350]: time="2024-02-09T10:27:01.222420519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:01.222811 env[1350]: time="2024-02-09T10:27:01.222754136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/159e0ef74ab219cb2acfda1598c8295d48893ecb875e7cfb4552150c50758aaf pid=2978 runtime=io.containerd.runc.v2 Feb 9 10:27:01.249457 systemd[1]: Started cri-containerd-159e0ef74ab219cb2acfda1598c8295d48893ecb875e7cfb4552150c50758aaf.scope. Feb 9 10:27:01.253727 kubelet[2478]: E0209 10:27:01.252102 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.253727 kubelet[2478]: W0209 10:27:01.252123 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.253727 kubelet[2478]: E0209 10:27:01.252149 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit: BPF prog-id=122 op=LOAD Feb 9 10:27:01.257000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.257000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2978 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396530656637346162323139636232616366646131353938633832 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2978 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396530656637346162323139636232616366646131353938633832 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.258000 audit: BPF prog-id=123 op=LOAD Feb 9 10:27:01.258000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2978 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396530656637346162323139636232616366646131353938633832 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.259000 audit: BPF prog-id=124 op=LOAD Feb 9 10:27:01.259000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2978 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396530656637346162323139636232616366646131353938633832 Feb 9 10:27:01.260000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:27:01.260000 audit: BPF prog-id=123 op=UNLOAD Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.260000 audit: BPF prog-id=125 op=LOAD Feb 9 10:27:01.260000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2978 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396530656637346162323139636232616366646131353938633832 Feb 9 10:27:01.285950 env[1350]: time="2024-02-09T10:27:01.285911071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-595f455bc8-65479,Uid:638ca2d7-4bf6-452f-be5c-3f34ad4279bc,Namespace:calico-system,Attempt:0,} returns sandbox id \"159e0ef74ab219cb2acfda1598c8295d48893ecb875e7cfb4552150c50758aaf\"" Feb 9 10:27:01.287531 env[1350]: time="2024-02-09T10:27:01.287477399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 10:27:01.320364 kubelet[2478]: E0209 10:27:01.320268 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.320364 kubelet[2478]: W0209 10:27:01.320295 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.320364 kubelet[2478]: E0209 10:27:01.320315 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.421586 kubelet[2478]: E0209 10:27:01.421553 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.421586 kubelet[2478]: W0209 10:27:01.421574 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.421586 kubelet[2478]: E0209 10:27:01.421593 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.450624 kubelet[2478]: E0209 10:27:01.449231 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:01.450624 kubelet[2478]: W0209 10:27:01.449257 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:01.450624 kubelet[2478]: E0209 10:27:01.449277 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:01.547451 env[1350]: time="2024-02-09T10:27:01.547397858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jk226,Uid:6b6e2fa2-90a9-4804-b49b-35a967c58472,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:01.590485 env[1350]: time="2024-02-09T10:27:01.590406871Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:01.590634 env[1350]: time="2024-02-09T10:27:01.590492384Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:01.590634 env[1350]: time="2024-02-09T10:27:01.590517263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:01.590841 env[1350]: time="2024-02-09T10:27:01.590771844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16 pid=3025 runtime=io.containerd.runc.v2 Feb 9 10:27:01.606721 systemd[1]: Started cri-containerd-a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16.scope. Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.627000 audit: BPF prog-id=126 op=LOAD Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3025 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132336163656335373630386136393933353933383366346634623661 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3025 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132336163656335373630386136393933353933383366346634623661 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit: BPF prog-id=127 op=LOAD Feb 9 10:27:01.628000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3025 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132336163656335373630386136393933353933383366346634623661 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit: BPF prog-id=128 op=LOAD Feb 9 10:27:01.628000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3025 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132336163656335373630386136393933353933383366346634623661 Feb 9 10:27:01.628000 audit: BPF prog-id=128 op=UNLOAD Feb 9 10:27:01.628000 audit: BPF prog-id=127 op=UNLOAD Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:01.628000 audit: BPF prog-id=129 op=LOAD Feb 9 10:27:01.628000 audit[3036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3025 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:01.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132336163656335373630386136393933353933383366346634623661 Feb 9 10:27:01.640757 env[1350]: time="2024-02-09T10:27:01.640713642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jk226,Uid:6b6e2fa2-90a9-4804-b49b-35a967c58472,Namespace:calico-system,Attempt:0,} returns sandbox id \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\"" Feb 9 10:27:01.828301 kubelet[2478]: E0209 10:27:01.828269 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:02.736741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3886264862.mount: Deactivated successfully. Feb 9 10:27:03.828370 kubelet[2478]: E0209 10:27:03.828078 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:03.893997 env[1350]: time="2024-02-09T10:27:03.893954366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.901713 env[1350]: time="2024-02-09T10:27:03.901660677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.908349 env[1350]: time="2024-02-09T10:27:03.908308340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.915714 env[1350]: time="2024-02-09T10:27:03.915670595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:03.916447 env[1350]: time="2024-02-09T10:27:03.916422303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 10:27:03.919871 env[1350]: time="2024-02-09T10:27:03.918171343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:27:03.930551 env[1350]: time="2024-02-09T10:27:03.930510856Z" level=info msg="CreateContainer within sandbox \"159e0ef74ab219cb2acfda1598c8295d48893ecb875e7cfb4552150c50758aaf\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 10:27:03.959144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4174067664.mount: Deactivated successfully. Feb 9 10:27:03.976984 env[1350]: time="2024-02-09T10:27:03.976933030Z" level=info msg="CreateContainer within sandbox \"159e0ef74ab219cb2acfda1598c8295d48893ecb875e7cfb4552150c50758aaf\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f228bc7d434d5e20061db16be6388a8ac1bd770ba54414edeb6b6386ca6b84bb\"" Feb 9 10:27:03.979133 env[1350]: time="2024-02-09T10:27:03.977710337Z" level=info msg="StartContainer for \"f228bc7d434d5e20061db16be6388a8ac1bd770ba54414edeb6b6386ca6b84bb\"" Feb 9 10:27:03.995911 systemd[1]: Started cri-containerd-f228bc7d434d5e20061db16be6388a8ac1bd770ba54414edeb6b6386ca6b84bb.scope. Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.011000 audit: BPF prog-id=130 op=LOAD Feb 9 10:27:04.012000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.012000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:04.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323862633764343334643565323030363164623136626536333838 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:04.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323862633764343334643565323030363164623136626536333838 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.013000 audit: BPF prog-id=131 op=LOAD Feb 9 10:27:04.013000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:04.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323862633764343334643565323030363164623136626536333838 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit: BPF prog-id=132 op=LOAD Feb 9 10:27:04.014000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:04.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323862633764343334643565323030363164623136626536333838 Feb 9 10:27:04.014000 audit: BPF prog-id=132 op=UNLOAD Feb 9 10:27:04.014000 audit: BPF prog-id=131 op=UNLOAD Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:04.014000 audit: BPF prog-id=133 op=LOAD Feb 9 10:27:04.014000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:04.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323862633764343334643565323030363164623136626536333838 Feb 9 10:27:04.043529 env[1350]: time="2024-02-09T10:27:04.043478757Z" level=info msg="StartContainer for \"f228bc7d434d5e20061db16be6388a8ac1bd770ba54414edeb6b6386ca6b84bb\" returns successfully" Feb 9 10:27:04.959973 kubelet[2478]: I0209 10:27:04.959925 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-595f455bc8-65479" podStartSLOduration=-9.223372031894894e+09 pod.CreationTimestamp="2024-02-09 10:27:00 +0000 UTC" firstStartedPulling="2024-02-09 10:27:01.287117025 +0000 UTC m=+21.620354600" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:04.959146919 +0000 UTC m=+25.292384494" watchObservedRunningTime="2024-02-09 10:27:04.95988247 +0000 UTC m=+25.293120085" Feb 9 10:27:04.999110 kubelet[2478]: E0209 10:27:04.999086 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:04.999268 kubelet[2478]: W0209 10:27:04.999254 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:04.999338 kubelet[2478]: E0209 10:27:04.999327 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:04.999554 kubelet[2478]: E0209 10:27:04.999543 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:04.999639 kubelet[2478]: W0209 10:27:04.999627 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:04.999751 kubelet[2478]: E0209 10:27:04.999740 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:04.999971 kubelet[2478]: E0209 10:27:04.999960 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.000047 kubelet[2478]: W0209 10:27:05.000034 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.000109 kubelet[2478]: E0209 10:27:05.000100 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.000336 kubelet[2478]: E0209 10:27:05.000325 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.000422 kubelet[2478]: W0209 10:27:05.000411 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.000487 kubelet[2478]: E0209 10:27:05.000477 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.000726 kubelet[2478]: E0209 10:27:05.000676 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.000819 kubelet[2478]: W0209 10:27:05.000804 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.000879 kubelet[2478]: E0209 10:27:05.000871 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.001153 kubelet[2478]: E0209 10:27:05.001138 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.001243 kubelet[2478]: W0209 10:27:05.001231 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.001310 kubelet[2478]: E0209 10:27:05.001300 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.001607 kubelet[2478]: E0209 10:27:05.001592 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.001741 kubelet[2478]: W0209 10:27:05.001676 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.001829 kubelet[2478]: E0209 10:27:05.001817 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.002040 kubelet[2478]: E0209 10:27:05.002028 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.002121 kubelet[2478]: W0209 10:27:05.002109 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.002183 kubelet[2478]: E0209 10:27:05.002173 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.002371 kubelet[2478]: E0209 10:27:05.002360 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.002440 kubelet[2478]: W0209 10:27:05.002429 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.002495 kubelet[2478]: E0209 10:27:05.002486 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.002721 kubelet[2478]: E0209 10:27:05.002681 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.002808 kubelet[2478]: W0209 10:27:05.002797 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.002869 kubelet[2478]: E0209 10:27:05.002860 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.003051 kubelet[2478]: E0209 10:27:05.003040 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.003127 kubelet[2478]: W0209 10:27:05.003116 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.003185 kubelet[2478]: E0209 10:27:05.003177 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.003369 kubelet[2478]: E0209 10:27:05.003359 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.003450 kubelet[2478]: W0209 10:27:05.003438 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.003507 kubelet[2478]: E0209 10:27:05.003498 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.041865 kubelet[2478]: E0209 10:27:05.041840 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.042039 kubelet[2478]: W0209 10:27:05.042025 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.042105 kubelet[2478]: E0209 10:27:05.042095 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.042360 kubelet[2478]: E0209 10:27:05.042348 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.042453 kubelet[2478]: W0209 10:27:05.042441 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.042526 kubelet[2478]: E0209 10:27:05.042516 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.042801 kubelet[2478]: E0209 10:27:05.042783 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.042801 kubelet[2478]: W0209 10:27:05.042800 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.042906 kubelet[2478]: E0209 10:27:05.042820 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.042992 kubelet[2478]: E0209 10:27:05.042978 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.042992 kubelet[2478]: W0209 10:27:05.042990 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.043081 kubelet[2478]: E0209 10:27:05.043007 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.043164 kubelet[2478]: E0209 10:27:05.043151 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.043164 kubelet[2478]: W0209 10:27:05.043162 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.043234 kubelet[2478]: E0209 10:27:05.043181 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.043359 kubelet[2478]: E0209 10:27:05.043345 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.043359 kubelet[2478]: W0209 10:27:05.043358 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.043426 kubelet[2478]: E0209 10:27:05.043373 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.043727 kubelet[2478]: E0209 10:27:05.043712 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.043804 kubelet[2478]: W0209 10:27:05.043793 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.043870 kubelet[2478]: E0209 10:27:05.043861 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.044085 kubelet[2478]: E0209 10:27:05.044067 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.044085 kubelet[2478]: W0209 10:27:05.044084 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.044183 kubelet[2478]: E0209 10:27:05.044101 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.044262 kubelet[2478]: E0209 10:27:05.044248 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.044262 kubelet[2478]: W0209 10:27:05.044261 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.044341 kubelet[2478]: E0209 10:27:05.044278 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.044422 kubelet[2478]: E0209 10:27:05.044410 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.044422 kubelet[2478]: W0209 10:27:05.044420 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.044501 kubelet[2478]: E0209 10:27:05.044436 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.044600 kubelet[2478]: E0209 10:27:05.044576 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.044600 kubelet[2478]: W0209 10:27:05.044595 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.044661 kubelet[2478]: E0209 10:27:05.044606 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.044913 kubelet[2478]: E0209 10:27:05.044899 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.045007 kubelet[2478]: W0209 10:27:05.044994 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.045075 kubelet[2478]: E0209 10:27:05.045065 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.045304 kubelet[2478]: E0209 10:27:05.045292 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.045379 kubelet[2478]: W0209 10:27:05.045368 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.045458 kubelet[2478]: E0209 10:27:05.045447 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.045726 kubelet[2478]: E0209 10:27:05.045702 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.045726 kubelet[2478]: W0209 10:27:05.045716 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.045815 kubelet[2478]: E0209 10:27:05.045737 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.045904 kubelet[2478]: E0209 10:27:05.045890 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.045904 kubelet[2478]: W0209 10:27:05.045903 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.045986 kubelet[2478]: E0209 10:27:05.045916 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.046070 kubelet[2478]: E0209 10:27:05.046056 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.046070 kubelet[2478]: W0209 10:27:05.046068 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.046138 kubelet[2478]: E0209 10:27:05.046079 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.046247 kubelet[2478]: E0209 10:27:05.046234 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.046247 kubelet[2478]: W0209 10:27:05.046246 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.046310 kubelet[2478]: E0209 10:27:05.046256 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.046662 kubelet[2478]: E0209 10:27:05.046644 2478 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:27:05.046662 kubelet[2478]: W0209 10:27:05.046660 2478 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:27:05.046775 kubelet[2478]: E0209 10:27:05.046674 2478 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:27:05.572448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount639102085.mount: Deactivated successfully. Feb 9 10:27:05.733970 env[1350]: time="2024-02-09T10:27:05.733915764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:05.742109 env[1350]: time="2024-02-09T10:27:05.742063505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:05.746535 env[1350]: time="2024-02-09T10:27:05.746496932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:05.750925 env[1350]: time="2024-02-09T10:27:05.750893521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:05.751356 env[1350]: time="2024-02-09T10:27:05.751327052Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 10:27:05.755055 env[1350]: time="2024-02-09T10:27:05.755018288Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:27:05.782263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1284676811.mount: Deactivated successfully. Feb 9 10:27:05.798734 env[1350]: time="2024-02-09T10:27:05.798668922Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8\"" Feb 9 10:27:05.800807 env[1350]: time="2024-02-09T10:27:05.799297161Z" level=info msg="StartContainer for \"03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8\"" Feb 9 10:27:05.814622 systemd[1]: Started cri-containerd-03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8.scope. Feb 9 10:27:05.829786 kubelet[2478]: E0209 10:27:05.829682 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:05.834000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840505 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 10:27:05.840595 kernel: audit: type=1400 audit(1707474425.834:1138): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.834000 audit[3140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3025 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:05.884134 kernel: audit: type=1300 audit(1707474425.834:1138): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3025 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:05.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616537316266616539326565336566626665313239356464383637 Feb 9 10:27:05.908131 kernel: audit: type=1327 audit(1707474425.834:1138): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616537316266616539326565336566626665313239356464383637 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.928937 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.931614 systemd[1]: cri-containerd-03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8.scope: Deactivated successfully. Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.950245 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.967352 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.967424 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.985966 env[1350]: time="2024-02-09T10:27:05.985930222Z" level=info msg="StartContainer for \"03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8\" returns successfully" Feb 9 10:27:05.991633 kubelet[2478]: I0209 10:27:05.990959 2478 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:27:06.002325 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:06.020101 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:06.039381 kernel: audit: type=1400 audit(1707474425.840:1139): avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.840000 audit: BPF prog-id=134 op=LOAD Feb 9 10:27:05.840000 audit[3140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3025 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:05.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616537316266616539326565336566626665313239356464383637 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit: BPF prog-id=135 op=LOAD Feb 9 10:27:05.857000 audit[3140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3025 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:05.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616537316266616539326565336566626665313239356464383637 Feb 9 10:27:05.857000 audit: BPF prog-id=135 op=UNLOAD Feb 9 10:27:05.857000 audit: BPF prog-id=134 op=UNLOAD Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { perfmon } for pid=3140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit[3140]: AVC avc: denied { bpf } for pid=3140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:05.857000 audit: BPF prog-id=136 op=LOAD Feb 9 10:27:05.857000 audit[3140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3025 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:05.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616537316266616539326565336566626665313239356464383637 Feb 9 10:27:05.949000 audit: BPF prog-id=136 op=UNLOAD Feb 9 10:27:06.044994 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8-rootfs.mount: Deactivated successfully. Feb 9 10:27:06.903547 env[1350]: time="2024-02-09T10:27:06.903493803Z" level=info msg="shim disconnected" id=03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8 Feb 9 10:27:06.903547 env[1350]: time="2024-02-09T10:27:06.903540800Z" level=warning msg="cleaning up after shim disconnected" id=03ae71bfae92ee3efbfe1295dd86700a28f6ac696bf36121460ceba48eeb31b8 namespace=k8s.io Feb 9 10:27:06.903547 env[1350]: time="2024-02-09T10:27:06.903550799Z" level=info msg="cleaning up dead shim" Feb 9 10:27:06.910300 env[1350]: time="2024-02-09T10:27:06.910245725Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:27:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3183 runtime=io.containerd.runc.v2\n" Feb 9 10:27:07.001939 env[1350]: time="2024-02-09T10:27:07.001311254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:27:07.827983 kubelet[2478]: E0209 10:27:07.827951 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:09.829597 kubelet[2478]: E0209 10:27:09.829547 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:11.829770 kubelet[2478]: E0209 10:27:11.829723 2478 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:11.968725 env[1350]: time="2024-02-09T10:27:11.968502225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:11.976508 env[1350]: time="2024-02-09T10:27:11.976461472Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:11.980952 env[1350]: time="2024-02-09T10:27:11.980923327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:11.985590 env[1350]: time="2024-02-09T10:27:11.985564491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:11.986046 env[1350]: time="2024-02-09T10:27:11.986015584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 10:27:11.989820 env[1350]: time="2024-02-09T10:27:11.989711565Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:27:12.029243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1666730690.mount: Deactivated successfully. Feb 9 10:27:12.045993 env[1350]: time="2024-02-09T10:27:12.045944106Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2\"" Feb 9 10:27:12.046484 env[1350]: time="2024-02-09T10:27:12.046460796Z" level=info msg="StartContainer for \"879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2\"" Feb 9 10:27:12.069561 systemd[1]: Started cri-containerd-879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2.scope. Feb 9 10:27:12.107539 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:27:12.107673 kernel: audit: type=1400 audit(1707474432.082:1145): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3025 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:12.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393534356137646130386537333839666136626537373939623237 Feb 9 10:27:12.160002 kernel: audit: type=1300 audit(1707474432.082:1145): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3025 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:12.160089 kernel: audit: type=1327 audit(1707474432.082:1145): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393534356137646130386537333839666136626537373939623237 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.178846 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.196357 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.213832 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.231696 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.251511 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.269836 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.269929 env[1350]: time="2024-02-09T10:27:12.252285808Z" level=info msg="StartContainer for \"879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2\" returns successfully" Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.287950 kernel: audit: type=1400 audit(1707474432.082:1146): avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.082000 audit: BPF prog-id=137 op=LOAD Feb 9 10:27:12.082000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3025 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:12.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393534356137646130386537333839666136626537373939623237 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.088000 audit: BPF prog-id=138 op=LOAD Feb 9 10:27:12.088000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3025 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:12.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393534356137646130386537333839666136626537373939623237 Feb 9 10:27:12.105000 audit: BPF prog-id=138 op=UNLOAD Feb 9 10:27:12.106000 audit: BPF prog-id=137 op=UNLOAD Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:12.106000 audit: BPF prog-id=139 op=LOAD Feb 9 10:27:12.106000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3025 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:12.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837393534356137646130386537333839666136626537373939623237 Feb 9 10:27:13.026609 systemd[1]: run-containerd-runc-k8s.io-879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2-runc.cVFObo.mount: Deactivated successfully. Feb 9 10:27:13.519018 systemd[1]: cri-containerd-879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2.scope: Deactivated successfully. Feb 9 10:27:13.522000 audit: BPF prog-id=139 op=UNLOAD Feb 9 10:27:13.537411 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2-rootfs.mount: Deactivated successfully. Feb 9 10:27:13.600241 kubelet[2478]: I0209 10:27:13.600046 2478 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.620806 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.621371 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.630538 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.724372 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rfklv\" (UniqueName: \"kubernetes.io/projected/52f461cd-e178-4dd9-a502-a84b7384d8db-kube-api-access-rfklv\") pod \"coredns-787d4945fb-ngpf7\" (UID: \"52f461cd-e178-4dd9-a502-a84b7384d8db\") " pod="kube-system/coredns-787d4945fb-ngpf7" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.724413 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/843f5a8d-1bdb-435a-8378-96f0394b1bca-tigera-ca-bundle\") pod \"calico-kube-controllers-7b896cb6f8-dpq9n\" (UID: \"843f5a8d-1bdb-435a-8378-96f0394b1bca\") " pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.724441 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nrx2h\" (UniqueName: \"kubernetes.io/projected/843f5a8d-1bdb-435a-8378-96f0394b1bca-kube-api-access-nrx2h\") pod \"calico-kube-controllers-7b896cb6f8-dpq9n\" (UID: \"843f5a8d-1bdb-435a-8378-96f0394b1bca\") " pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" Feb 9 10:27:13.914662 kubelet[2478]: I0209 10:27:13.724464 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zr4wc\" (UniqueName: \"kubernetes.io/projected/c62158b9-80d9-4e55-a9ba-be5ea33fdb00-kube-api-access-zr4wc\") pod \"coredns-787d4945fb-qdfrz\" (UID: \"c62158b9-80d9-4e55-a9ba-be5ea33fdb00\") " pod="kube-system/coredns-787d4945fb-qdfrz" Feb 9 10:27:13.626357 systemd[1]: Created slice kubepods-burstable-pod52f461cd_e178_4dd9_a502_a84b7384d8db.slice. Feb 9 10:27:13.915061 kubelet[2478]: I0209 10:27:13.724488 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c62158b9-80d9-4e55-a9ba-be5ea33fdb00-config-volume\") pod \"coredns-787d4945fb-qdfrz\" (UID: \"c62158b9-80d9-4e55-a9ba-be5ea33fdb00\") " pod="kube-system/coredns-787d4945fb-qdfrz" Feb 9 10:27:13.915061 kubelet[2478]: I0209 10:27:13.724509 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/52f461cd-e178-4dd9-a502-a84b7384d8db-config-volume\") pod \"coredns-787d4945fb-ngpf7\" (UID: \"52f461cd-e178-4dd9-a502-a84b7384d8db\") " pod="kube-system/coredns-787d4945fb-ngpf7" Feb 9 10:27:13.631635 systemd[1]: Created slice kubepods-burstable-podc62158b9_80d9_4e55_a9ba_be5ea33fdb00.slice. Feb 9 10:27:13.639155 systemd[1]: Created slice kubepods-besteffort-pod843f5a8d_1bdb_435a_8378_96f0394b1bca.slice. Feb 9 10:27:13.834138 systemd[1]: Created slice kubepods-besteffort-pod388dce7f_7d7d_4ba3_8cc1_9dce8d294f22.slice. Feb 9 10:27:13.919733 env[1350]: time="2024-02-09T10:27:13.919480742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rdvxw,Uid:388dce7f-7d7d-4ba3-8cc1-9dce8d294f22,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:14.217407 env[1350]: time="2024-02-09T10:27:14.217153915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-ngpf7,Uid:52f461cd-e178-4dd9-a502-a84b7384d8db,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:14.219129 env[1350]: time="2024-02-09T10:27:14.219090726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b896cb6f8-dpq9n,Uid:843f5a8d-1bdb-435a-8378-96f0394b1bca,Namespace:calico-system,Attempt:0,}" Feb 9 10:27:14.219587 env[1350]: time="2024-02-09T10:27:14.219415387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-qdfrz,Uid:c62158b9-80d9-4e55-a9ba-be5ea33fdb00,Namespace:kube-system,Attempt:0,}" Feb 9 10:27:14.687031 env[1350]: time="2024-02-09T10:27:14.686712085Z" level=info msg="shim disconnected" id=879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2 Feb 9 10:27:14.687031 env[1350]: time="2024-02-09T10:27:14.686758523Z" level=warning msg="cleaning up after shim disconnected" id=879545a7da08e7389fa6be7799b273a58a41c5941212903cd8a8eac151cb8ac2 namespace=k8s.io Feb 9 10:27:14.687031 env[1350]: time="2024-02-09T10:27:14.686767882Z" level=info msg="cleaning up dead shim" Feb 9 10:27:14.693944 env[1350]: time="2024-02-09T10:27:14.693911118Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:27:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3257 runtime=io.containerd.runc.v2\n" Feb 9 10:27:14.892724 env[1350]: time="2024-02-09T10:27:14.892642081Z" level=error msg="Failed to destroy network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.893058 env[1350]: time="2024-02-09T10:27:14.893017300Z" level=error msg="encountered an error cleaning up failed sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.893114 env[1350]: time="2024-02-09T10:27:14.893073217Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rdvxw,Uid:388dce7f-7d7d-4ba3-8cc1-9dce8d294f22,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.893666 kubelet[2478]: E0209 10:27:14.893298 2478 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.893666 kubelet[2478]: E0209 10:27:14.893354 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:14.893666 kubelet[2478]: E0209 10:27:14.893380 2478 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rdvxw" Feb 9 10:27:14.894013 kubelet[2478]: E0209 10:27:14.893445 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rdvxw_calico-system(388dce7f-7d7d-4ba3-8cc1-9dce8d294f22)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rdvxw_calico-system(388dce7f-7d7d-4ba3-8cc1-9dce8d294f22)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:14.920051 env[1350]: time="2024-02-09T10:27:14.919989175Z" level=error msg="Failed to destroy network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.920395 env[1350]: time="2024-02-09T10:27:14.920333556Z" level=error msg="encountered an error cleaning up failed sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.920395 env[1350]: time="2024-02-09T10:27:14.920383073Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-qdfrz,Uid:c62158b9-80d9-4e55-a9ba-be5ea33fdb00,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.920622 kubelet[2478]: E0209 10:27:14.920595 2478 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.920714 kubelet[2478]: E0209 10:27:14.920648 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-qdfrz" Feb 9 10:27:14.920714 kubelet[2478]: E0209 10:27:14.920675 2478 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-qdfrz" Feb 9 10:27:14.920791 kubelet[2478]: E0209 10:27:14.920759 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-qdfrz_kube-system(c62158b9-80d9-4e55-a9ba-be5ea33fdb00)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-qdfrz_kube-system(c62158b9-80d9-4e55-a9ba-be5ea33fdb00)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-qdfrz" podUID=c62158b9-80d9-4e55-a9ba-be5ea33fdb00 Feb 9 10:27:14.945302 env[1350]: time="2024-02-09T10:27:14.944368797Z" level=error msg="Failed to destroy network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.945302 env[1350]: time="2024-02-09T10:27:14.944747335Z" level=error msg="encountered an error cleaning up failed sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.945302 env[1350]: time="2024-02-09T10:27:14.944794893Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b896cb6f8-dpq9n,Uid:843f5a8d-1bdb-435a-8378-96f0394b1bca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.945522 kubelet[2478]: E0209 10:27:14.945328 2478 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.945522 kubelet[2478]: E0209 10:27:14.945379 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" Feb 9 10:27:14.945522 kubelet[2478]: E0209 10:27:14.945403 2478 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" Feb 9 10:27:14.945703 kubelet[2478]: E0209 10:27:14.945463 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7b896cb6f8-dpq9n_calico-system(843f5a8d-1bdb-435a-8378-96f0394b1bca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7b896cb6f8-dpq9n_calico-system(843f5a8d-1bdb-435a-8378-96f0394b1bca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" podUID=843f5a8d-1bdb-435a-8378-96f0394b1bca Feb 9 10:27:14.947477 env[1350]: time="2024-02-09T10:27:14.947432343Z" level=error msg="Failed to destroy network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.948387 env[1350]: time="2024-02-09T10:27:14.948343852Z" level=error msg="encountered an error cleaning up failed sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.948473 env[1350]: time="2024-02-09T10:27:14.948399209Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-ngpf7,Uid:52f461cd-e178-4dd9-a502-a84b7384d8db,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.948573 kubelet[2478]: E0209 10:27:14.948552 2478 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:14.949434 kubelet[2478]: E0209 10:27:14.948829 2478 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-ngpf7" Feb 9 10:27:14.949434 kubelet[2478]: E0209 10:27:14.948962 2478 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-ngpf7" Feb 9 10:27:14.949434 kubelet[2478]: E0209 10:27:14.949019 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-ngpf7_kube-system(52f461cd-e178-4dd9-a502-a84b7384d8db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-ngpf7_kube-system(52f461cd-e178-4dd9-a502-a84b7384d8db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-ngpf7" podUID=52f461cd-e178-4dd9-a502-a84b7384d8db Feb 9 10:27:15.019151 kubelet[2478]: I0209 10:27:15.019119 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:15.020122 env[1350]: time="2024-02-09T10:27:15.020081093Z" level=info msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" Feb 9 10:27:15.023240 kubelet[2478]: I0209 10:27:15.023212 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:15.024582 env[1350]: time="2024-02-09T10:27:15.024537045Z" level=info msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" Feb 9 10:27:15.025111 kubelet[2478]: I0209 10:27:15.025092 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:15.026278 env[1350]: time="2024-02-09T10:27:15.026074959Z" level=info msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" Feb 9 10:27:15.037525 env[1350]: time="2024-02-09T10:27:15.037492324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:27:15.045568 kubelet[2478]: I0209 10:27:15.044903 2478 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:15.045858 env[1350]: time="2024-02-09T10:27:15.045829500Z" level=info msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" Feb 9 10:27:15.086941 env[1350]: time="2024-02-09T10:27:15.086882376Z" level=error msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" failed" error="failed to destroy network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:15.088055 kubelet[2478]: E0209 10:27:15.087358 2478 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:15.088055 kubelet[2478]: E0209 10:27:15.087418 2478 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058} Feb 9 10:27:15.088055 kubelet[2478]: E0209 10:27:15.087452 2478 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:15.088055 kubelet[2478]: E0209 10:27:15.087479 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rdvxw" podUID=388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 Feb 9 10:27:15.105889 env[1350]: time="2024-02-09T10:27:15.105828962Z" level=error msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" failed" error="failed to destroy network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:15.106107 kubelet[2478]: E0209 10:27:15.106074 2478 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:15.106234 kubelet[2478]: E0209 10:27:15.106127 2478 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73} Feb 9 10:27:15.106234 kubelet[2478]: E0209 10:27:15.106163 2478 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"843f5a8d-1bdb-435a-8378-96f0394b1bca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:15.106234 kubelet[2478]: E0209 10:27:15.106189 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"843f5a8d-1bdb-435a-8378-96f0394b1bca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" podUID=843f5a8d-1bdb-435a-8378-96f0394b1bca Feb 9 10:27:15.107399 env[1350]: time="2024-02-09T10:27:15.107352717Z" level=error msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" failed" error="failed to destroy network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:15.107728 kubelet[2478]: E0209 10:27:15.107595 2478 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:15.107728 kubelet[2478]: E0209 10:27:15.107622 2478 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17} Feb 9 10:27:15.107728 kubelet[2478]: E0209 10:27:15.107650 2478 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c62158b9-80d9-4e55-a9ba-be5ea33fdb00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:15.107728 kubelet[2478]: E0209 10:27:15.107696 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c62158b9-80d9-4e55-a9ba-be5ea33fdb00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-qdfrz" podUID=c62158b9-80d9-4e55-a9ba-be5ea33fdb00 Feb 9 10:27:15.109805 env[1350]: time="2024-02-09T10:27:15.109762143Z" level=error msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" failed" error="failed to destroy network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:27:15.110198 kubelet[2478]: E0209 10:27:15.110075 2478 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:15.110198 kubelet[2478]: E0209 10:27:15.110116 2478 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23} Feb 9 10:27:15.110198 kubelet[2478]: E0209 10:27:15.110145 2478 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52f461cd-e178-4dd9-a502-a84b7384d8db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:27:15.110198 kubelet[2478]: E0209 10:27:15.110181 2478 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52f461cd-e178-4dd9-a502-a84b7384d8db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-ngpf7" podUID=52f461cd-e178-4dd9-a502-a84b7384d8db Feb 9 10:27:15.796169 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23-shm.mount: Deactivated successfully. Feb 9 10:27:15.796269 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058-shm.mount: Deactivated successfully. Feb 9 10:27:15.796328 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17-shm.mount: Deactivated successfully. Feb 9 10:27:22.144956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1613519653.mount: Deactivated successfully. Feb 9 10:27:22.792332 env[1350]: time="2024-02-09T10:27:22.792274641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:22.799275 env[1350]: time="2024-02-09T10:27:22.799228293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:22.803441 env[1350]: time="2024-02-09T10:27:22.803403844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:22.808922 env[1350]: time="2024-02-09T10:27:22.808894329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:22.809321 env[1350]: time="2024-02-09T10:27:22.809291429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 10:27:22.831040 env[1350]: time="2024-02-09T10:27:22.830995263Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:27:22.861023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount423680007.mount: Deactivated successfully. Feb 9 10:27:22.878626 env[1350]: time="2024-02-09T10:27:22.878576162Z" level=info msg="CreateContainer within sandbox \"a23acec57608a699359383f4f4b6a2878b256bc40745a4dc9952716f748efb16\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2\"" Feb 9 10:27:22.880151 env[1350]: time="2024-02-09T10:27:22.880116324Z" level=info msg="StartContainer for \"cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2\"" Feb 9 10:27:22.894883 systemd[1]: Started cri-containerd-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2.scope. Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.919548 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:27:22.919623 kernel: audit: type=1400 audit(1707474442.913:1152): avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3025 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:22.964192 kernel: audit: type=1300 audit(1707474442.913:1152): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3025 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:22.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383430616365316338316334646239326531626139366138333536 Feb 9 10:27:22.989226 kernel: audit: type=1327 audit(1707474442.913:1152): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383430616365316338316334646239326531626139366138333536 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.007739 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.007849 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.043072 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.062119 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.083319 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.083411 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:23.102844 env[1350]: time="2024-02-09T10:27:23.102808608Z" level=info msg="StartContainer for \"cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2\" returns successfully" Feb 9 10:27:23.120915 kernel: audit: type=1400 audit(1707474442.913:1153): avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit: BPF prog-id=140 op=LOAD Feb 9 10:27:22.913000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3025 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:22.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383430616365316338316334646239326531626139366138333536 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit: BPF prog-id=141 op=LOAD Feb 9 10:27:22.913000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3025 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:22.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383430616365316338316334646239326531626139366138333536 Feb 9 10:27:22.913000 audit: BPF prog-id=141 op=UNLOAD Feb 9 10:27:22.913000 audit: BPF prog-id=140 op=UNLOAD Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { perfmon } for pid=3486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit[3486]: AVC avc: denied { bpf } for pid=3486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:22.913000 audit: BPF prog-id=142 op=LOAD Feb 9 10:27:22.913000 audit[3486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3025 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:22.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363383430616365316338316334646239326531626139366138333536 Feb 9 10:27:23.347851 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:27:23.348002 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Feb 9 10:27:24.130063 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.TVPnrW.mount: Deactivated successfully. Feb 9 10:27:24.659000 audit[3625]: AVC avc: denied { write } for pid=3625 comm="tee" name="fd" dev="proc" ino=25649 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.659000 audit[3625]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4d2396d a2=241 a3=1b6 items=1 ppid=3575 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.659000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:27:24.659000 audit: PATH item=0 name="/dev/fd/63" inode=24779 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.674000 audit[3623]: AVC avc: denied { write } for pid=3623 comm="tee" name="fd" dev="proc" ino=25665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.674000 audit[3623]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe189496d a2=241 a3=1b6 items=1 ppid=3577 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.674000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:27:24.674000 audit: PATH item=0 name="/dev/fd/63" inode=24778 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.674000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.685000 audit[3627]: AVC avc: denied { write } for pid=3627 comm="tee" name="fd" dev="proc" ino=25671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.685000 audit[3627]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf1d595d a2=241 a3=1b6 items=1 ppid=3587 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.685000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:27:24.685000 audit: PATH item=0 name="/dev/fd/63" inode=25662 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.685000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.687000 audit[3631]: AVC avc: denied { write } for pid=3631 comm="tee" name="fd" dev="proc" ino=24784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.688000 audit[3634]: AVC avc: denied { write } for pid=3634 comm="tee" name="fd" dev="proc" ino=24787 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.689000 audit[3635]: AVC avc: denied { write } for pid=3635 comm="tee" name="fd" dev="proc" ino=24790 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.687000 audit[3631]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc93c96d a2=241 a3=1b6 items=1 ppid=3579 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.695000 audit[3637]: AVC avc: denied { write } for pid=3637 comm="tee" name="fd" dev="proc" ino=24794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:27:24.688000 audit[3634]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef1e796f a2=241 a3=1b6 items=1 ppid=3581 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.687000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:27:24.687000 audit: PATH item=0 name="/dev/fd/63" inode=25667 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.687000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.688000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:27:24.688000 audit: PATH item=0 name="/dev/fd/63" inode=25668 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.688000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.689000 audit[3635]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe906796e a2=241 a3=1b6 items=1 ppid=3573 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.689000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:27:24.689000 audit: PATH item=0 name="/dev/fd/63" inode=24780 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:24.695000 audit[3637]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd858d95e a2=241 a3=1b6 items=1 ppid=3583 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:24.695000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:27:24.695000 audit: PATH item=0 name="/dev/fd/63" inode=24781 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:24.695000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:27:25.125484 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.9lKkIL.mount: Deactivated successfully. Feb 9 10:27:25.829891 env[1350]: time="2024-02-09T10:27:25.829850101Z" level=info msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" Feb 9 10:27:25.899598 kubelet[2478]: I0209 10:27:25.899559 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jk226" podStartSLOduration=-9.223372010955256e+09 pod.CreationTimestamp="2024-02-09 10:27:00 +0000 UTC" firstStartedPulling="2024-02-09 10:27:01.641756608 +0000 UTC m=+21.974994223" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:24.133660667 +0000 UTC m=+44.466898282" watchObservedRunningTime="2024-02-09 10:27:25.899520516 +0000 UTC m=+46.232758131" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.896 [INFO][3694] k8s.go 578: Cleaning up netns ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.896 [INFO][3694] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" iface="eth0" netns="/var/run/netns/cni-36bc5ef8-dd92-8697-230f-af0384411abc" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.897 [INFO][3694] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" iface="eth0" netns="/var/run/netns/cni-36bc5ef8-dd92-8697-230f-af0384411abc" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.897 [INFO][3694] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" iface="eth0" netns="/var/run/netns/cni-36bc5ef8-dd92-8697-230f-af0384411abc" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.897 [INFO][3694] k8s.go 585: Releasing IP address(es) ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.897 [INFO][3694] utils.go 188: Calico CNI releasing IP address ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.922 [INFO][3714] ipam_plugin.go 415: Releasing address using handleID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.922 [INFO][3714] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.923 [INFO][3714] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.932 [WARNING][3714] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.932 [INFO][3714] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.933 [INFO][3714] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:25.936114 env[1350]: 2024-02-09 10:27:25.935 [INFO][3694] k8s.go 591: Teardown processing complete. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:25.938610 systemd[1]: run-netns-cni\x2d36bc5ef8\x2ddd92\x2d8697\x2d230f\x2daf0384411abc.mount: Deactivated successfully. Feb 9 10:27:25.939729 env[1350]: time="2024-02-09T10:27:25.939649550Z" level=info msg="TearDown network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" successfully" Feb 9 10:27:25.939823 env[1350]: time="2024-02-09T10:27:25.939805542Z" level=info msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" returns successfully" Feb 9 10:27:25.940609 env[1350]: time="2024-02-09T10:27:25.940582145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-qdfrz,Uid:c62158b9-80d9-4e55-a9ba-be5ea33fdb00,Namespace:kube-system,Attempt:1,}" Feb 9 10:27:26.135273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:26.135529 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calideaaa52dc20: link becomes ready Feb 9 10:27:26.138796 systemd-networkd[1495]: calideaaa52dc20: Link UP Feb 9 10:27:26.138933 systemd-networkd[1495]: calideaaa52dc20: Gained carrier Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.012 [INFO][3725] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.025 [INFO][3725] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0 coredns-787d4945fb- kube-system c62158b9-80d9-4e55-a9ba-be5ea33fdb00 676 0 2024-02-09 10:26:53 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 coredns-787d4945fb-qdfrz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calideaaa52dc20 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.025 [INFO][3725] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.048 [INFO][3737] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" HandleID="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.060 [INFO][3737] ipam_plugin.go 268: Auto assigning IP ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" HandleID="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003174c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-a099f8e901", "pod":"coredns-787d4945fb-qdfrz", "timestamp":"2024-02-09 10:27:26.048976532 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.060 [INFO][3737] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.060 [INFO][3737] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.060 [INFO][3737] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.061 [INFO][3737] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.065 [INFO][3737] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.069 [INFO][3737] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.070 [INFO][3737] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.072 [INFO][3737] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.072 [INFO][3737] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.073 [INFO][3737] ipam.go 1682: Creating new handle: k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6 Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.077 [INFO][3737] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.081 [INFO][3737] ipam.go 1216: Successfully claimed IPs: [192.168.71.129/26] block=192.168.71.128/26 handle="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.081 [INFO][3737] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.129/26] handle="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.081 [INFO][3737] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:26.154649 env[1350]: 2024-02-09 10:27:26.081 [INFO][3737] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.129/26] IPv6=[] ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" HandleID="k8s-pod-network.7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.083 [INFO][3725] k8s.go 385: Populated endpoint ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c62158b9-80d9-4e55-a9ba-be5ea33fdb00", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"coredns-787d4945fb-qdfrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaaa52dc20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.084 [INFO][3725] k8s.go 386: Calico CNI using IPs: [192.168.71.129/32] ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.084 [INFO][3725] dataplane_linux.go 68: Setting the host side veth name to calideaaa52dc20 ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.136 [INFO][3725] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.140 [INFO][3725] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c62158b9-80d9-4e55-a9ba-be5ea33fdb00", ResourceVersion:"676", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6", Pod:"coredns-787d4945fb-qdfrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaaa52dc20", MAC:"6a:c6:04:3a:6a:0b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:26.155419 env[1350]: 2024-02-09 10:27:26.151 [INFO][3725] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6" Namespace="kube-system" Pod="coredns-787d4945fb-qdfrz" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:26.170014 env[1350]: time="2024-02-09T10:27:26.169942281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:26.170014 env[1350]: time="2024-02-09T10:27:26.169982999Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:26.170014 env[1350]: time="2024-02-09T10:27:26.169993759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:26.170352 env[1350]: time="2024-02-09T10:27:26.170296665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6 pid=3762 runtime=io.containerd.runc.v2 Feb 9 10:27:26.184859 systemd[1]: Started cri-containerd-7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6.scope. Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.200000 audit: BPF prog-id=143 op=LOAD Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3762 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343132623063313638346235336539336261633161303365656438 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3762 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343132623063313638346235336539336261633161303365656438 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.201000 audit: BPF prog-id=144 op=LOAD Feb 9 10:27:26.201000 audit[3772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3762 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343132623063313638346235336539336261633161303365656438 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.202000 audit: BPF prog-id=145 op=LOAD Feb 9 10:27:26.202000 audit[3772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3762 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343132623063313638346235336539336261633161303365656438 Feb 9 10:27:26.203000 audit: BPF prog-id=145 op=UNLOAD Feb 9 10:27:26.203000 audit: BPF prog-id=144 op=UNLOAD Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.203000 audit: BPF prog-id=146 op=LOAD Feb 9 10:27:26.203000 audit[3772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3762 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763343132623063313638346235336539336261633161303365656438 Feb 9 10:27:26.223760 env[1350]: time="2024-02-09T10:27:26.223712254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-qdfrz,Uid:c62158b9-80d9-4e55-a9ba-be5ea33fdb00,Namespace:kube-system,Attempt:1,} returns sandbox id \"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6\"" Feb 9 10:27:26.228940 env[1350]: time="2024-02-09T10:27:26.228909648Z" level=info msg="CreateContainer within sandbox \"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:27:26.309297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount132074732.mount: Deactivated successfully. Feb 9 10:27:26.328309 env[1350]: time="2024-02-09T10:27:26.328259062Z" level=info msg="CreateContainer within sandbox \"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d99eda467b5de9c0caed2f7f86cd36536d2c60ea92e457e23415ffc9f514b60e\"" Feb 9 10:27:26.329050 env[1350]: time="2024-02-09T10:27:26.328968708Z" level=info msg="StartContainer for \"d99eda467b5de9c0caed2f7f86cd36536d2c60ea92e457e23415ffc9f514b60e\"" Feb 9 10:27:26.345197 systemd[1]: Started cri-containerd-d99eda467b5de9c0caed2f7f86cd36536d2c60ea92e457e23415ffc9f514b60e.scope. Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.357000 audit: BPF prog-id=147 op=LOAD Feb 9 10:27:26.359000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.359000 audit[3803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3762 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439396564613436376235646539633063616564326637663836636433 Feb 9 10:27:26.359000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.359000 audit[3803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3762 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439396564613436376235646539633063616564326637663836636433 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit: BPF prog-id=148 op=LOAD Feb 9 10:27:26.360000 audit[3803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3762 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439396564613436376235646539633063616564326637663836636433 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.360000 audit: BPF prog-id=149 op=LOAD Feb 9 10:27:26.360000 audit[3803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3762 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439396564613436376235646539633063616564326637663836636433 Feb 9 10:27:26.361000 audit: BPF prog-id=149 op=UNLOAD Feb 9 10:27:26.361000 audit: BPF prog-id=148 op=UNLOAD Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:26.361000 audit: BPF prog-id=150 op=LOAD Feb 9 10:27:26.361000 audit[3803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3762 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:26.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439396564613436376235646539633063616564326637663836636433 Feb 9 10:27:26.385521 env[1350]: time="2024-02-09T10:27:26.385460992Z" level=info msg="StartContainer for \"d99eda467b5de9c0caed2f7f86cd36536d2c60ea92e457e23415ffc9f514b60e\" returns successfully" Feb 9 10:27:26.829427 env[1350]: time="2024-02-09T10:27:26.828805789Z" level=info msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] k8s.go 578: Cleaning up netns ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" iface="eth0" netns="/var/run/netns/cni-3cf16878-ad25-ea6f-898e-9dc4423c4c6e" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" iface="eth0" netns="/var/run/netns/cni-3cf16878-ad25-ea6f-898e-9dc4423c4c6e" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" iface="eth0" netns="/var/run/netns/cni-3cf16878-ad25-ea6f-898e-9dc4423c4c6e" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] k8s.go 585: Releasing IP address(es) ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.868 [INFO][3850] utils.go 188: Calico CNI releasing IP address ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.888 [INFO][3856] ipam_plugin.go 415: Releasing address using handleID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.889 [INFO][3856] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.889 [INFO][3856] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.897 [WARNING][3856] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.897 [INFO][3856] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.898 [INFO][3856] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:26.901098 env[1350]: 2024-02-09 10:27:26.899 [INFO][3850] k8s.go 591: Teardown processing complete. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:26.901796 env[1350]: time="2024-02-09T10:27:26.901240918Z" level=info msg="TearDown network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" successfully" Feb 9 10:27:26.901796 env[1350]: time="2024-02-09T10:27:26.901271997Z" level=info msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" returns successfully" Feb 9 10:27:26.901889 env[1350]: time="2024-02-09T10:27:26.901855809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-ngpf7,Uid:52f461cd-e178-4dd9-a502-a84b7384d8db,Namespace:kube-system,Attempt:1,}" Feb 9 10:27:27.034764 systemd-networkd[1495]: cali6faa6e1cfc9: Link UP Feb 9 10:27:27.046906 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6faa6e1cfc9: link becomes ready Feb 9 10:27:27.046511 systemd-networkd[1495]: cali6faa6e1cfc9: Gained carrier Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:26.954 [INFO][3863] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:26.966 [INFO][3863] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0 coredns-787d4945fb- kube-system 52f461cd-e178-4dd9-a502-a84b7384d8db 687 0 2024-02-09 10:26:53 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 coredns-787d4945fb-ngpf7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6faa6e1cfc9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:26.966 [INFO][3863] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:26.988 [INFO][3874] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" HandleID="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.003 [INFO][3874] ipam_plugin.go 268: Auto assigning IP ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" HandleID="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001184b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-a099f8e901", "pod":"coredns-787d4945fb-ngpf7", "timestamp":"2024-02-09 10:27:26.9885817 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.003 [INFO][3874] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.003 [INFO][3874] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.003 [INFO][3874] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.005 [INFO][3874] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.010 [INFO][3874] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.015 [INFO][3874] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.017 [INFO][3874] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.021 [INFO][3874] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.021 [INFO][3874] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.022 [INFO][3874] ipam.go 1682: Creating new handle: k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81 Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.026 [INFO][3874] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.031 [INFO][3874] ipam.go 1216: Successfully claimed IPs: [192.168.71.130/26] block=192.168.71.128/26 handle="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.031 [INFO][3874] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.130/26] handle="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.031 [INFO][3874] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:27.063676 env[1350]: 2024-02-09 10:27:27.031 [INFO][3874] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.130/26] IPv6=[] ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" HandleID="k8s-pod-network.6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.032 [INFO][3863] k8s.go 385: Populated endpoint ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"52f461cd-e178-4dd9-a502-a84b7384d8db", ResourceVersion:"687", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"coredns-787d4945fb-ngpf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6faa6e1cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.032 [INFO][3863] k8s.go 386: Calico CNI using IPs: [192.168.71.130/32] ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.032 [INFO][3863] dataplane_linux.go 68: Setting the host side veth name to cali6faa6e1cfc9 ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.051 [INFO][3863] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.054 [INFO][3863] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"52f461cd-e178-4dd9-a502-a84b7384d8db", ResourceVersion:"687", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81", Pod:"coredns-787d4945fb-ngpf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6faa6e1cfc9", MAC:"a6:0f:2f:ac:ab:82", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:27.064328 env[1350]: 2024-02-09 10:27:27.061 [INFO][3863] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81" Namespace="kube-system" Pod="coredns-787d4945fb-ngpf7" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:27.085134 env[1350]: time="2024-02-09T10:27:27.084984426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:27.085134 env[1350]: time="2024-02-09T10:27:27.085024904Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:27.085327 env[1350]: time="2024-02-09T10:27:27.085037503Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:27.085327 env[1350]: time="2024-02-09T10:27:27.085215135Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81 pid=3912 runtime=io.containerd.runc.v2 Feb 9 10:27:27.101080 systemd[1]: Started cri-containerd-6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81.scope. Feb 9 10:27:27.130422 systemd[1]: run-netns-cni\x2d3cf16878\x2dad25\x2dea6f\x2d898e\x2d9dc4423c4c6e.mount: Deactivated successfully. Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit: BPF prog-id=151 op=LOAD Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3912 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323836333162633366643230626565633838613961626432666439 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3912 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323836333162633366643230626565633838613961626432666439 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit: BPF prog-id=152 op=LOAD Feb 9 10:27:27.141000 audit[3921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3912 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323836333162633366643230626565633838613961626432666439 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit: BPF prog-id=153 op=LOAD Feb 9 10:27:27.141000 audit[3921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3912 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323836333162633366643230626565633838613961626432666439 Feb 9 10:27:27.141000 audit: BPF prog-id=153 op=UNLOAD Feb 9 10:27:27.141000 audit: BPF prog-id=152 op=UNLOAD Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.141000 audit: BPF prog-id=154 op=LOAD Feb 9 10:27:27.141000 audit[3921]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3912 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323836333162633366643230626565633838613961626432666439 Feb 9 10:27:27.154822 kubelet[2478]: I0209 10:27:27.154158 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-qdfrz" podStartSLOduration=34.154120473 pod.CreationTimestamp="2024-02-09 10:26:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:27.138073584 +0000 UTC m=+47.471311199" watchObservedRunningTime="2024-02-09 10:27:27.154120473 +0000 UTC m=+47.487358088" Feb 9 10:27:27.197620 env[1350]: time="2024-02-09T10:27:27.197531244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-ngpf7,Uid:52f461cd-e178-4dd9-a502-a84b7384d8db,Namespace:kube-system,Attempt:1,} returns sandbox id \"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81\"" Feb 9 10:27:27.200976 env[1350]: time="2024-02-09T10:27:27.200930245Z" level=info msg="CreateContainer within sandbox \"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:27:27.247000 audit[3978]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=3978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.247000 audit[3978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffffa0160a0 a2=0 a3=ffffb087d6c0 items=0 ppid=2634 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.248944 env[1350]: time="2024-02-09T10:27:27.248892762Z" level=info msg="CreateContainer within sandbox \"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"72c45d02f71c482e4b53cc560ffb267dd72436bd8760062803589d2f563b1eb9\"" Feb 9 10:27:27.249631 env[1350]: time="2024-02-09T10:27:27.249595809Z" level=info msg="StartContainer for \"72c45d02f71c482e4b53cc560ffb267dd72436bd8760062803589d2f563b1eb9\"" Feb 9 10:27:27.248000 audit[3978]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=3978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.248000 audit[3978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffffa0160a0 a2=0 a3=ffffb087d6c0 items=0 ppid=2634 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.266007 systemd[1]: Started cri-containerd-72c45d02f71c482e4b53cc560ffb267dd72436bd8760062803589d2f563b1eb9.scope. Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit: BPF prog-id=155 op=LOAD Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3912 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633435643032663731633438326534623533636335363066666232 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3912 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633435643032663731633438326534623533636335363066666232 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit: BPF prog-id=156 op=LOAD Feb 9 10:27:27.282000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3912 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633435643032663731633438326534623533636335363066666232 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit: BPF prog-id=157 op=LOAD Feb 9 10:27:27.282000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3912 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633435643032663731633438326534623533636335363066666232 Feb 9 10:27:27.282000 audit: BPF prog-id=157 op=UNLOAD Feb 9 10:27:27.282000 audit: BPF prog-id=156 op=UNLOAD Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:27.282000 audit: BPF prog-id=158 op=LOAD Feb 9 10:27:27.282000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3912 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732633435643032663731633438326534623533636335363066666232 Feb 9 10:27:27.302871 env[1350]: time="2024-02-09T10:27:27.302815401Z" level=info msg="StartContainer for \"72c45d02f71c482e4b53cc560ffb267dd72436bd8760062803589d2f563b1eb9\" returns successfully" Feb 9 10:27:27.332000 audit[4039]: NETFILTER_CFG table=filter:114 family=2 entries=11 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.332000 audit[4039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe4e49020 a2=0 a3=ffff8a8956c0 items=0 ppid=2634 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.334000 audit[4039]: NETFILTER_CFG table=nat:115 family=2 entries=41 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:27.334000 audit[4039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=15828 a0=3 a1=ffffe4e49020 a2=0 a3=ffff8a8956c0 items=0 ppid=2634 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:27.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:27.448807 systemd-networkd[1495]: calideaaa52dc20: Gained IPv6LL Feb 9 10:27:27.833103 env[1350]: time="2024-02-09T10:27:27.833058490Z" level=info msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.876 [INFO][4056] k8s.go 578: Cleaning up netns ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.876 [INFO][4056] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" iface="eth0" netns="/var/run/netns/cni-99af395a-ae6b-1d6d-180a-56632d9269f8" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.876 [INFO][4056] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" iface="eth0" netns="/var/run/netns/cni-99af395a-ae6b-1d6d-180a-56632d9269f8" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.877 [INFO][4056] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" iface="eth0" netns="/var/run/netns/cni-99af395a-ae6b-1d6d-180a-56632d9269f8" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.877 [INFO][4056] k8s.go 585: Releasing IP address(es) ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.877 [INFO][4056] utils.go 188: Calico CNI releasing IP address ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.918 [INFO][4062] ipam_plugin.go 415: Releasing address using handleID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.918 [INFO][4062] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.918 [INFO][4062] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.930 [WARNING][4062] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.930 [INFO][4062] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.931 [INFO][4062] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:27.933486 env[1350]: 2024-02-09 10:27:27.932 [INFO][4056] k8s.go 591: Teardown processing complete. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:27.934207 env[1350]: time="2024-02-09T10:27:27.933617188Z" level=info msg="TearDown network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" successfully" Feb 9 10:27:27.934207 env[1350]: time="2024-02-09T10:27:27.933657547Z" level=info msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" returns successfully" Feb 9 10:27:27.934942 env[1350]: time="2024-02-09T10:27:27.934916008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rdvxw,Uid:388dce7f-7d7d-4ba3-8cc1-9dce8d294f22,Namespace:calico-system,Attempt:1,}" Feb 9 10:27:28.084445 systemd-networkd[1495]: cali14cbfdd24d1: Link UP Feb 9 10:27:28.099450 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:28.099603 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14cbfdd24d1: link becomes ready Feb 9 10:27:28.099852 systemd-networkd[1495]: cali14cbfdd24d1: Gained carrier Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.008 [INFO][4069] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.021 [INFO][4069] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0 csi-node-driver- calico-system 388dce7f-7d7d-4ba3-8cc1-9dce8d294f22 704 0 2024-02-09 10:27:00 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 csi-node-driver-rdvxw eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali14cbfdd24d1 [] []}} ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.021 [INFO][4069] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.046 [INFO][4079] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" HandleID="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.059 [INFO][4079] ipam_plugin.go 268: Auto assigning IP ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" HandleID="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bcde0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-a099f8e901", "pod":"csi-node-driver-rdvxw", "timestamp":"2024-02-09 10:27:28.046210791 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.059 [INFO][4079] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.060 [INFO][4079] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.060 [INFO][4079] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.061 [INFO][4079] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.064 [INFO][4079] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.067 [INFO][4079] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.069 [INFO][4079] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.071 [INFO][4079] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.071 [INFO][4079] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.072 [INFO][4079] ipam.go 1682: Creating new handle: k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6 Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.075 [INFO][4079] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.080 [INFO][4079] ipam.go 1216: Successfully claimed IPs: [192.168.71.131/26] block=192.168.71.128/26 handle="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.080 [INFO][4079] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.131/26] handle="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.080 [INFO][4079] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:28.108945 env[1350]: 2024-02-09 10:27:28.080 [INFO][4079] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.131/26] IPv6=[] ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" HandleID="k8s-pod-network.06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.082 [INFO][4069] k8s.go 385: Populated endpoint ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"csi-node-driver-rdvxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14cbfdd24d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.082 [INFO][4069] k8s.go 386: Calico CNI using IPs: [192.168.71.131/32] ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.082 [INFO][4069] dataplane_linux.go 68: Setting the host side veth name to cali14cbfdd24d1 ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.100 [INFO][4069] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.100 [INFO][4069] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6", Pod:"csi-node-driver-rdvxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14cbfdd24d1", MAC:"56:b4:32:ba:43:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:28.110903 env[1350]: 2024-02-09 10:27:28.107 [INFO][4069] k8s.go 491: Wrote updated endpoint to datastore ContainerID="06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6" Namespace="calico-system" Pod="csi-node-driver-rdvxw" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:28.129868 systemd[1]: run-netns-cni\x2d99af395a\x2dae6b\x2d1d6d\x2d180a\x2d56632d9269f8.mount: Deactivated successfully. Feb 9 10:27:28.137385 env[1350]: time="2024-02-09T10:27:28.137298787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:28.137710 env[1350]: time="2024-02-09T10:27:28.137586734Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:28.139018 env[1350]: time="2024-02-09T10:27:28.138983589Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:28.139386 env[1350]: time="2024-02-09T10:27:28.139339733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6 pid=4102 runtime=io.containerd.runc.v2 Feb 9 10:27:28.162496 systemd[1]: run-containerd-runc-k8s.io-06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6-runc.aY1Wq8.mount: Deactivated successfully. Feb 9 10:27:28.164845 systemd[1]: Started cri-containerd-06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6.scope. Feb 9 10:27:28.169040 kubelet[2478]: I0209 10:27:28.168996 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-ngpf7" podStartSLOduration=35.168944887 pod.CreationTimestamp="2024-02-09 10:26:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:28.137713808 +0000 UTC m=+48.470951463" watchObservedRunningTime="2024-02-09 10:27:28.168944887 +0000 UTC m=+48.502182502" Feb 9 10:27:28.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208307 kernel: kauditd_printk_skb: 308 callbacks suppressed Feb 9 10:27:28.208430 kernel: audit: type=1400 audit(1707474448.201:1241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.255830 kernel: audit: type=1400 audit(1707474448.201:1242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.261478 env[1350]: time="2024-02-09T10:27:28.261440297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rdvxw,Uid:388dce7f-7d7d-4ba3-8cc1-9dce8d294f22,Namespace:calico-system,Attempt:1,} returns sandbox id \"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6\"" Feb 9 10:27:28.275237 kernel: audit: type=1400 audit(1707474448.202:1243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.277173 env[1350]: time="2024-02-09T10:27:28.277138013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.295175 kernel: audit: type=1400 audit(1707474448.202:1244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.312886 kernel: audit: type=1400 audit(1707474448.202:1245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.337096 kernel: audit: type=1400 audit(1707474448.202:1246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.366583 kernel: audit: type=1400 audit(1707474448.202:1247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.386224 kernel: audit: type=1400 audit(1707474448.202:1248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.408971 kernel: audit: type=1400 audit(1707474448.202:1249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.428099 kernel: audit: type=1400 audit(1707474448.202:1250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit: BPF prog-id=159 op=LOAD Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4102 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666131656664623364323136613663633737306336313933383230 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4102 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666131656664623364323136613663633737306336313933383230 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.202000 audit: BPF prog-id=160 op=LOAD Feb 9 10:27:28.202000 audit[4112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4102 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666131656664623364323136613663633737306336313933383230 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.208000 audit: BPF prog-id=161 op=LOAD Feb 9 10:27:28.208000 audit[4112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4102 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666131656664623364323136613663633737306336313933383230 Feb 9 10:27:28.225000 audit: BPF prog-id=161 op=UNLOAD Feb 9 10:27:28.225000 audit: BPF prog-id=160 op=UNLOAD Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:28.225000 audit: BPF prog-id=162 op=LOAD Feb 9 10:27:28.225000 audit[4112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4102 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666131656664623364323136613663633737306336313933383230 Feb 9 10:27:28.438000 audit[4180]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.438000 audit[4180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd2b9e640 a2=0 a3=ffffa30216c0 items=0 ppid=2634 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.439000 audit[4180]: NETFILTER_CFG table=nat:117 family=2 entries=50 op=nft_register_rule pid=4180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:28.439000 audit[4180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=15828 a0=3 a1=ffffd2b9e640 a2=0 a3=ffffa30216c0 items=0 ppid=2634 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:28.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:28.473830 systemd-networkd[1495]: cali6faa6e1cfc9: Gained IPv6LL Feb 9 10:27:29.509000 audit[4228]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:29.509000 audit[4228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff26445f0 a2=0 a3=ffffb22fd6c0 items=0 ppid=2634 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:29.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:29.546000 audit[4228]: NETFILTER_CFG table=nat:119 family=2 entries=62 op=nft_register_chain pid=4228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:29.546000 audit[4228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21492 a0=3 a1=fffff26445f0 a2=0 a3=ffffb22fd6c0 items=0 ppid=2634 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:29.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:29.816836 systemd-networkd[1495]: cali14cbfdd24d1: Gained IPv6LL Feb 9 10:27:29.829992 env[1350]: time="2024-02-09T10:27:29.829736192Z" level=info msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.886 [INFO][4248] k8s.go 578: Cleaning up netns ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.886 [INFO][4248] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" iface="eth0" netns="/var/run/netns/cni-f6ed21cd-5524-936f-cfe5-ae9ec58c0bb3" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.886 [INFO][4248] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" iface="eth0" netns="/var/run/netns/cni-f6ed21cd-5524-936f-cfe5-ae9ec58c0bb3" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.887 [INFO][4248] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" iface="eth0" netns="/var/run/netns/cni-f6ed21cd-5524-936f-cfe5-ae9ec58c0bb3" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.887 [INFO][4248] k8s.go 585: Releasing IP address(es) ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.887 [INFO][4248] utils.go 188: Calico CNI releasing IP address ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.904 [INFO][4254] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.904 [INFO][4254] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.904 [INFO][4254] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.914 [WARNING][4254] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.914 [INFO][4254] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.915 [INFO][4254] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:29.917504 env[1350]: 2024-02-09 10:27:29.916 [INFO][4248] k8s.go 591: Teardown processing complete. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:29.919542 systemd[1]: run-netns-cni\x2df6ed21cd\x2d5524\x2d936f\x2dcfe5\x2dae9ec58c0bb3.mount: Deactivated successfully. Feb 9 10:27:29.921088 env[1350]: time="2024-02-09T10:27:29.921049790Z" level=info msg="TearDown network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" successfully" Feb 9 10:27:29.921179 env[1350]: time="2024-02-09T10:27:29.921163145Z" level=info msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" returns successfully" Feb 9 10:27:29.921911 env[1350]: time="2024-02-09T10:27:29.921882952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b896cb6f8-dpq9n,Uid:843f5a8d-1bdb-435a-8378-96f0394b1bca,Namespace:calico-system,Attempt:1,}" Feb 9 10:27:30.142047 systemd-networkd[1495]: caliaa1df87e39a: Link UP Feb 9 10:27:30.155029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:30.155159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaa1df87e39a: link becomes ready Feb 9 10:27:30.164875 systemd-networkd[1495]: caliaa1df87e39a: Gained carrier Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:29.996 [INFO][4264] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.014 [INFO][4264] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0 calico-kube-controllers-7b896cb6f8- calico-system 843f5a8d-1bdb-435a-8378-96f0394b1bca 728 0 2024-02-09 10:27:00 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7b896cb6f8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 calico-kube-controllers-7b896cb6f8-dpq9n eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaa1df87e39a [] []}} ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.014 [INFO][4264] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.076 [INFO][4278] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" HandleID="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.091 [INFO][4278] ipam_plugin.go 268: Auto assigning IP ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" HandleID="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025ea00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-a099f8e901", "pod":"calico-kube-controllers-7b896cb6f8-dpq9n", "timestamp":"2024-02-09 10:27:30.076398752 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.092 [INFO][4278] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.092 [INFO][4278] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.092 [INFO][4278] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.093 [INFO][4278] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.106 [INFO][4278] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.113 [INFO][4278] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.116 [INFO][4278] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.118 [INFO][4278] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.118 [INFO][4278] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.120 [INFO][4278] ipam.go 1682: Creating new handle: k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32 Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.126 [INFO][4278] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.130 [INFO][4278] ipam.go 1216: Successfully claimed IPs: [192.168.71.132/26] block=192.168.71.128/26 handle="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.130 [INFO][4278] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.132/26] handle="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.130 [INFO][4278] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:30.177430 env[1350]: 2024-02-09 10:27:30.130 [INFO][4278] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.132/26] IPv6=[] ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" HandleID="k8s-pod-network.3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.132 [INFO][4264] k8s.go 385: Populated endpoint ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0", GenerateName:"calico-kube-controllers-7b896cb6f8-", Namespace:"calico-system", SelfLink:"", UID:"843f5a8d-1bdb-435a-8378-96f0394b1bca", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b896cb6f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"calico-kube-controllers-7b896cb6f8-dpq9n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa1df87e39a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.132 [INFO][4264] k8s.go 386: Calico CNI using IPs: [192.168.71.132/32] ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.132 [INFO][4264] dataplane_linux.go 68: Setting the host side veth name to caliaa1df87e39a ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.165 [INFO][4264] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.165 [INFO][4264] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0", GenerateName:"calico-kube-controllers-7b896cb6f8-", Namespace:"calico-system", SelfLink:"", UID:"843f5a8d-1bdb-435a-8378-96f0394b1bca", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b896cb6f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32", Pod:"calico-kube-controllers-7b896cb6f8-dpq9n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa1df87e39a", MAC:"ee:3d:c6:f9:6c:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:30.178096 env[1350]: 2024-02-09 10:27:30.175 [INFO][4264] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32" Namespace="calico-system" Pod="calico-kube-controllers-7b896cb6f8-dpq9n" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:30.222022 env[1350]: time="2024-02-09T10:27:30.221950960Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:30.222022 env[1350]: time="2024-02-09T10:27:30.221994678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:30.222249 env[1350]: time="2024-02-09T10:27:30.222214788Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:30.222480 env[1350]: time="2024-02-09T10:27:30.222431938Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32 pid=4324 runtime=io.containerd.runc.v2 Feb 9 10:27:30.256644 systemd[1]: Started cri-containerd-3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32.scope. Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.296000 audit: BPF prog-id=163 op=LOAD Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363396130306363633163376162323862663738613736376532663063 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363396130306363633163376162323862663738613736376532663063 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit: BPF prog-id=164 op=LOAD Feb 9 10:27:30.297000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363396130306363633163376162323862663738613736376532663063 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit: BPF prog-id=165 op=LOAD Feb 9 10:27:30.297000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363396130306363633163376162323862663738613736376532663063 Feb 9 10:27:30.297000 audit: BPF prog-id=165 op=UNLOAD Feb 9 10:27:30.297000 audit: BPF prog-id=164 op=UNLOAD Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.297000 audit: BPF prog-id=166 op=LOAD Feb 9 10:27:30.297000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4324 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363396130306363633163376162323862663738613736376532663063 Feb 9 10:27:30.327481 env[1350]: time="2024-02-09T10:27:30.322732064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b896cb6f8-dpq9n,Uid:843f5a8d-1bdb-435a-8378-96f0394b1bca,Namespace:calico-system,Attempt:1,} returns sandbox id \"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32\"" Feb 9 10:27:30.327481 env[1350]: time="2024-02-09T10:27:30.325130396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.333122 env[1350]: time="2024-02-09T10:27:30.333070358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.339136 env[1350]: time="2024-02-09T10:27:30.339093927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.345942 env[1350]: time="2024-02-09T10:27:30.345904300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:30.346161 env[1350]: time="2024-02-09T10:27:30.346123531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:27:30.347889 env[1350]: time="2024-02-09T10:27:30.347840173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 10:27:30.348789 env[1350]: time="2024-02-09T10:27:30.348750372Z" level=info msg="CreateContainer within sandbox \"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit: BPF prog-id=167 op=LOAD Feb 9 10:27:30.372000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffefb91348 a2=70 a3=0 items=0 ppid=4260 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.372000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:30.372000 audit: BPF prog-id=167 op=UNLOAD Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.372000 audit: BPF prog-id=168 op=LOAD Feb 9 10:27:30.372000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffefb91348 a2=70 a3=4a174c items=0 ppid=4260 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.372000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:30.373000 audit: BPF prog-id=168 op=UNLOAD Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffefb91378 a2=70 a3=1807d79f items=0 ppid=4260 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.373000 audit: BPF prog-id=169 op=LOAD Feb 9 10:27:30.373000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffefb912c8 a2=70 a3=1807d7b9 items=0 ppid=4260 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.373000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:27:30.381000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.381000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe5f20098 a2=70 a3=0 items=0 ppid=4260 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:27:30.381000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.381000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe5f1ff78 a2=70 a3=2 items=0 ppid=4260 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:27:30.388000 audit: BPF prog-id=169 op=UNLOAD Feb 9 10:27:30.409788 env[1350]: time="2024-02-09T10:27:30.403895130Z" level=info msg="CreateContainer within sandbox \"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b835e55595f43d8d748c558c5b3b8f4c2539b6a5d23ab5246b1fc319c751f9e8\"" Feb 9 10:27:30.411714 env[1350]: time="2024-02-09T10:27:30.410742462Z" level=info msg="StartContainer for \"b835e55595f43d8d748c558c5b3b8f4c2539b6a5d23ab5246b1fc319c751f9e8\"" Feb 9 10:27:30.427251 systemd[1]: Started cri-containerd-b835e55595f43d8d748c558c5b3b8f4c2539b6a5d23ab5246b1fc319c751f9e8.scope. Feb 9 10:27:30.442000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.442000 audit[4400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4102 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333565353535393566343364386437343863353538633562336238 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit: BPF prog-id=170 op=LOAD Feb 9 10:27:30.443000 audit[4400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4102 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333565353535393566343364386437343863353538633562336238 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.443000 audit: BPF prog-id=171 op=LOAD Feb 9 10:27:30.443000 audit[4400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4102 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333565353535393566343364386437343863353538633562336238 Feb 9 10:27:30.444000 audit: BPF prog-id=171 op=UNLOAD Feb 9 10:27:30.444000 audit: BPF prog-id=170 op=UNLOAD Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { perfmon } for pid=4400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit[4400]: AVC avc: denied { bpf } for pid=4400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:30.444000 audit: BPF prog-id=172 op=LOAD Feb 9 10:27:30.444000 audit[4400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4102 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333565353535393566343364386437343863353538633562336238 Feb 9 10:27:30.471309 env[1350]: time="2024-02-09T10:27:30.471264138Z" level=info msg="StartContainer for \"b835e55595f43d8d748c558c5b3b8f4c2539b6a5d23ab5246b1fc319c751f9e8\" returns successfully" Feb 9 10:27:30.633000 audit[4493]: NETFILTER_CFG table=filter:120 family=2 entries=7 op=nft_register_rule pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:30.633000 audit[4493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffcc435010 a2=0 a3=ffffa44ba6c0 items=0 ppid=2634 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:30.637000 audit[4493]: NETFILTER_CFG table=nat:121 family=2 entries=75 op=nft_register_chain pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:30.637000 audit[4493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffcc435010 a2=0 a3=ffffa44ba6c0 items=0 ppid=2634 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:30.661000 audit[4472]: NETFILTER_CFG table=mangle:122 family=2 entries=19 op=nft_register_chain pid=4472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:30.661000 audit[4472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffcd6c57e0 a2=0 a3=ffff9b0c1fa8 items=0 ppid=4260 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.661000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:30.669000 audit[4480]: NETFILTER_CFG table=nat:123 family=2 entries=16 op=nft_register_chain pid=4480 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:30.669000 audit[4480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffde5c19b0 a2=0 a3=ffffa901efa8 items=0 ppid=4260 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:30.693000 audit[4497]: NETFILTER_CFG table=filter:124 family=2 entries=151 op=nft_register_chain pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:30.693000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=83968 a0=3 a1=ffffe4387590 a2=0 a3=ffffb5724fa8 items=0 ppid=4260 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.693000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:30.731000 audit[4482]: NETFILTER_CFG table=raw:125 family=2 entries=19 op=nft_register_chain pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:30.731000 audit[4482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffffbd1c850 a2=0 a3=ffffa4c78fa8 items=0 ppid=4260 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:30.731000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:30.920423 systemd[1]: run-containerd-runc-k8s.io-3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32-runc.NfYGNH.mount: Deactivated successfully. Feb 9 10:27:31.205834 systemd-networkd[1495]: vxlan.calico: Link UP Feb 9 10:27:31.205841 systemd-networkd[1495]: vxlan.calico: Gained carrier Feb 9 10:27:31.801826 systemd-networkd[1495]: caliaa1df87e39a: Gained IPv6LL Feb 9 10:27:32.376802 systemd-networkd[1495]: vxlan.calico: Gained IPv6LL Feb 9 10:27:32.908478 env[1350]: time="2024-02-09T10:27:32.908428307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:32.918394 env[1350]: time="2024-02-09T10:27:32.918350671Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:32.924779 env[1350]: time="2024-02-09T10:27:32.924743710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:32.930707 env[1350]: time="2024-02-09T10:27:32.930653730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:32.931236 env[1350]: time="2024-02-09T10:27:32.931201146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 10:27:32.934857 env[1350]: time="2024-02-09T10:27:32.934817907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:27:32.945637 env[1350]: time="2024-02-09T10:27:32.945594673Z" level=info msg="CreateContainer within sandbox \"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 10:27:32.983117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3923471050.mount: Deactivated successfully. Feb 9 10:27:32.999508 env[1350]: time="2024-02-09T10:27:32.999429908Z" level=info msg="CreateContainer within sandbox \"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6\"" Feb 9 10:27:33.001468 env[1350]: time="2024-02-09T10:27:33.000116318Z" level=info msg="StartContainer for \"efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6\"" Feb 9 10:27:33.023122 systemd[1]: Started cri-containerd-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6.scope. Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.034000 audit: BPF prog-id=173 op=LOAD Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4324 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626337326637376562303737613133353437353735336663306562 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4324 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626337326637376562303737613133353437353735336663306562 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit: BPF prog-id=174 op=LOAD Feb 9 10:27:33.035000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4324 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626337326637376562303737613133353437353735336663306562 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit: BPF prog-id=175 op=LOAD Feb 9 10:27:33.035000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4324 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626337326637376562303737613133353437353735336663306562 Feb 9 10:27:33.035000 audit: BPF prog-id=175 op=UNLOAD Feb 9 10:27:33.035000 audit: BPF prog-id=174 op=UNLOAD Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:33.035000 audit: BPF prog-id=176 op=LOAD Feb 9 10:27:33.035000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4324 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626337326637376562303737613133353437353735336663306562 Feb 9 10:27:33.065563 env[1350]: time="2024-02-09T10:27:33.065515316Z" level=info msg="StartContainer for \"efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6\" returns successfully" Feb 9 10:27:33.196026 kubelet[2478]: I0209 10:27:33.195768 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7b896cb6f8-dpq9n" podStartSLOduration=-9.223372003659046e+09 pod.CreationTimestamp="2024-02-09 10:27:00 +0000 UTC" firstStartedPulling="2024-02-09 10:27:30.324013286 +0000 UTC m=+50.657250901" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:33.163112958 +0000 UTC m=+53.496350533" watchObservedRunningTime="2024-02-09 10:27:33.195729501 +0000 UTC m=+53.528967116" Feb 9 10:27:34.705610 env[1350]: time="2024-02-09T10:27:34.705559794Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:34.714794 env[1350]: time="2024-02-09T10:27:34.714756840Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:34.720061 env[1350]: time="2024-02-09T10:27:34.720021654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:34.726268 env[1350]: time="2024-02-09T10:27:34.726224387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:34.726975 env[1350]: time="2024-02-09T10:27:34.726940796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:27:34.729652 env[1350]: time="2024-02-09T10:27:34.729621361Z" level=info msg="CreateContainer within sandbox \"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:27:34.760959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount971669311.mount: Deactivated successfully. Feb 9 10:27:34.784309 env[1350]: time="2024-02-09T10:27:34.784264215Z" level=info msg="CreateContainer within sandbox \"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d78bb71bcc9167075ede4e10dda2ff5cae8dfe4fe7f4ae8f9566287aa1a2c411\"" Feb 9 10:27:34.784996 env[1350]: time="2024-02-09T10:27:34.784959185Z" level=info msg="StartContainer for \"d78bb71bcc9167075ede4e10dda2ff5cae8dfe4fe7f4ae8f9566287aa1a2c411\"" Feb 9 10:27:34.810191 systemd[1]: Started cri-containerd-d78bb71bcc9167075ede4e10dda2ff5cae8dfe4fe7f4ae8f9566287aa1a2c411.scope. Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.835842 kernel: kauditd_printk_skb: 283 callbacks suppressed Feb 9 10:27:34.835942 kernel: audit: type=1400 audit(1707474454.829:1320): avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4102 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:34.879748 kernel: audit: type=1300 audit(1707474454.829:1320): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4102 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:34.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386262373162636339313637303735656465346531306464613266 Feb 9 10:27:34.906123 kernel: audit: type=1327 audit(1707474454.829:1320): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386262373162636339313637303735656465346531306464613266 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.925853 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.936920 systemd[1]: run-containerd-runc-k8s.io-d78bb71bcc9167075ede4e10dda2ff5cae8dfe4fe7f4ae8f9566287aa1a2c411-runc.1SJUS2.mount: Deactivated successfully. Feb 9 10:27:34.943898 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.983730 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.983873 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.984324 env[1350]: time="2024-02-09T10:27:34.984277707Z" level=info msg="StartContainer for \"d78bb71bcc9167075ede4e10dda2ff5cae8dfe4fe7f4ae8f9566287aa1a2c411\" returns successfully" Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.001190 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.018683 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.019783 kubelet[2478]: I0209 10:27:35.019760 2478 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:27:35.020117 kubelet[2478]: I0209 10:27:35.020101 2478 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:35.038827 kernel: audit: type=1400 audit(1707474454.829:1321): avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.829000 audit: BPF prog-id=177 op=LOAD Feb 9 10:27:34.829000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4102 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:34.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386262373162636339313637303735656465346531306464613266 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.834000 audit: BPF prog-id=178 op=LOAD Feb 9 10:27:34.834000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4102 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:34.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386262373162636339313637303735656465346531306464613266 Feb 9 10:27:34.851000 audit: BPF prog-id=178 op=UNLOAD Feb 9 10:27:34.851000 audit: BPF prog-id=177 op=UNLOAD Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:34.851000 audit: BPF prog-id=179 op=LOAD Feb 9 10:27:34.851000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4102 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:34.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437386262373162636339313637303735656465346531306464613266 Feb 9 10:27:35.150582 kubelet[2478]: I0209 10:27:35.150551 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-rdvxw" podStartSLOduration=-9.223372001704268e+09 pod.CreationTimestamp="2024-02-09 10:27:00 +0000 UTC" firstStartedPulling="2024-02-09 10:27:28.276779789 +0000 UTC m=+48.610017364" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:35.14864892 +0000 UTC m=+55.481886495" watchObservedRunningTime="2024-02-09 10:27:35.150508521 +0000 UTC m=+55.483746136" Feb 9 10:27:35.737000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:35.737000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021d3320 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:35.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:35.764000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:35.764000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010c6810 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:35.764000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:36.693000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.693000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.693000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4002b5a9f0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.693000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40019289a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:36.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:36.707000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.707000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40050b21e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.707000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:36.710000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.710000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40050b2240 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:36.714000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.714000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40125e4940 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:36.722000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:36.722000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40050b2270 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:27:36.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:27:39.460350 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.cZcrBM.mount: Deactivated successfully. Feb 9 10:27:39.834832 env[1350]: time="2024-02-09T10:27:39.834731326Z" level=info msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.869 [WARNING][4660] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c62158b9-80d9-4e55-a9ba-be5ea33fdb00", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6", Pod:"coredns-787d4945fb-qdfrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaaa52dc20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.869 [INFO][4660] k8s.go 578: Cleaning up netns ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.869 [INFO][4660] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" iface="eth0" netns="" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.869 [INFO][4660] k8s.go 585: Releasing IP address(es) ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.869 [INFO][4660] utils.go 188: Calico CNI releasing IP address ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.886 [INFO][4666] ipam_plugin.go 415: Releasing address using handleID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.886 [INFO][4666] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.886 [INFO][4666] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.895 [WARNING][4666] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.895 [INFO][4666] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.896 [INFO][4666] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:39.898765 env[1350]: 2024-02-09 10:27:39.897 [INFO][4660] k8s.go 591: Teardown processing complete. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.899327 env[1350]: time="2024-02-09T10:27:39.899277100Z" level=info msg="TearDown network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" successfully" Feb 9 10:27:39.899404 env[1350]: time="2024-02-09T10:27:39.899387496Z" level=info msg="StopPodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" returns successfully" Feb 9 10:27:39.900026 env[1350]: time="2024-02-09T10:27:39.899994191Z" level=info msg="RemovePodSandbox for \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" Feb 9 10:27:39.900122 env[1350]: time="2024-02-09T10:27:39.900032749Z" level=info msg="Forcibly stopping sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\"" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.931 [WARNING][4685] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c62158b9-80d9-4e55-a9ba-be5ea33fdb00", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"7c412b0c1684b53e93bac1a03eed8a6e9eb82a21baaa8003ba5f55a021e335a6", Pod:"coredns-787d4945fb-qdfrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaaa52dc20", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.932 [INFO][4685] k8s.go 578: Cleaning up netns ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.932 [INFO][4685] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" iface="eth0" netns="" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.932 [INFO][4685] k8s.go 585: Releasing IP address(es) ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.932 [INFO][4685] utils.go 188: Calico CNI releasing IP address ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.950 [INFO][4692] ipam_plugin.go 415: Releasing address using handleID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.950 [INFO][4692] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.950 [INFO][4692] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.959 [WARNING][4692] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.959 [INFO][4692] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" HandleID="k8s-pod-network.1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--qdfrz-eth0" Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.961 [INFO][4692] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:39.964287 env[1350]: 2024-02-09 10:27:39.963 [INFO][4685] k8s.go 591: Teardown processing complete. ContainerID="1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17" Feb 9 10:27:39.967011 env[1350]: time="2024-02-09T10:27:39.964781395Z" level=info msg="TearDown network for sandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" successfully" Feb 9 10:27:39.976168 env[1350]: time="2024-02-09T10:27:39.976130853Z" level=info msg="RemovePodSandbox \"1c832828139fd6db41e526d091e51827c3eff9b7e570bd4a30388413b5af7f17\" returns successfully" Feb 9 10:27:39.976835 env[1350]: time="2024-02-09T10:27:39.976807386Z" level=info msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.012 [WARNING][4710] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6", Pod:"csi-node-driver-rdvxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14cbfdd24d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.012 [INFO][4710] k8s.go 578: Cleaning up netns ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.012 [INFO][4710] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" iface="eth0" netns="" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.012 [INFO][4710] k8s.go 585: Releasing IP address(es) ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.012 [INFO][4710] utils.go 188: Calico CNI releasing IP address ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.029 [INFO][4716] ipam_plugin.go 415: Releasing address using handleID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.029 [INFO][4716] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.030 [INFO][4716] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.039 [WARNING][4716] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.039 [INFO][4716] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.040 [INFO][4716] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.042645 env[1350]: 2024-02-09 10:27:40.041 [INFO][4710] k8s.go 591: Teardown processing complete. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.043211 env[1350]: time="2024-02-09T10:27:40.043177103Z" level=info msg="TearDown network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" successfully" Feb 9 10:27:40.043279 env[1350]: time="2024-02-09T10:27:40.043263139Z" level=info msg="StopPodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" returns successfully" Feb 9 10:27:40.043782 env[1350]: time="2024-02-09T10:27:40.043759759Z" level=info msg="RemovePodSandbox for \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" Feb 9 10:27:40.043942 env[1350]: time="2024-02-09T10:27:40.043904034Z" level=info msg="Forcibly stopping sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\"" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.101 [WARNING][4734] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"388dce7f-7d7d-4ba3-8cc1-9dce8d294f22", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"06fa1efdb3d216a6cc770c619382015fda00ed38db753b1c212f8666a4a217d6", Pod:"csi-node-driver-rdvxw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14cbfdd24d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.101 [INFO][4734] k8s.go 578: Cleaning up netns ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.101 [INFO][4734] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" iface="eth0" netns="" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.101 [INFO][4734] k8s.go 585: Releasing IP address(es) ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.101 [INFO][4734] utils.go 188: Calico CNI releasing IP address ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.119 [INFO][4742] ipam_plugin.go 415: Releasing address using handleID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.119 [INFO][4742] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.119 [INFO][4742] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.128 [WARNING][4742] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.128 [INFO][4742] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" HandleID="k8s-pod-network.c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Workload="ci--3510.3.2--a--a099f8e901-k8s-csi--node--driver--rdvxw-eth0" Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.129 [INFO][4742] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.132164 env[1350]: 2024-02-09 10:27:40.131 [INFO][4734] k8s.go 591: Teardown processing complete. ContainerID="c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058" Feb 9 10:27:40.132680 env[1350]: time="2024-02-09T10:27:40.132635220Z" level=info msg="TearDown network for sandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" successfully" Feb 9 10:27:40.143118 env[1350]: time="2024-02-09T10:27:40.143068000Z" level=info msg="RemovePodSandbox \"c88901317169bf3f1f9cec4bfba30c81e74e217b92733368944a6beebc4b5058\" returns successfully" Feb 9 10:27:40.143761 env[1350]: time="2024-02-09T10:27:40.143737613Z" level=info msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.184 [WARNING][4760] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"52f461cd-e178-4dd9-a502-a84b7384d8db", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81", Pod:"coredns-787d4945fb-ngpf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6faa6e1cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.184 [INFO][4760] k8s.go 578: Cleaning up netns ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.184 [INFO][4760] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" iface="eth0" netns="" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.184 [INFO][4760] k8s.go 585: Releasing IP address(es) ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.184 [INFO][4760] utils.go 188: Calico CNI releasing IP address ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.203 [INFO][4766] ipam_plugin.go 415: Releasing address using handleID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.203 [INFO][4766] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.203 [INFO][4766] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.212 [WARNING][4766] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.212 [INFO][4766] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.214 [INFO][4766] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.216575 env[1350]: 2024-02-09 10:27:40.215 [INFO][4760] k8s.go 591: Teardown processing complete. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.217211 env[1350]: time="2024-02-09T10:27:40.217178375Z" level=info msg="TearDown network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" successfully" Feb 9 10:27:40.217282 env[1350]: time="2024-02-09T10:27:40.217264931Z" level=info msg="StopPodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" returns successfully" Feb 9 10:27:40.217837 env[1350]: time="2024-02-09T10:27:40.217795670Z" level=info msg="RemovePodSandbox for \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" Feb 9 10:27:40.217915 env[1350]: time="2024-02-09T10:27:40.217841428Z" level=info msg="Forcibly stopping sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\"" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.257 [WARNING][4784] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"52f461cd-e178-4dd9-a502-a84b7384d8db", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 26, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"6c28631bc3fd20beec88a9abd2fd911db04682ac00fceb24c3266b89c0d42e81", Pod:"coredns-787d4945fb-ngpf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6faa6e1cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.257 [INFO][4784] k8s.go 578: Cleaning up netns ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.257 [INFO][4784] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" iface="eth0" netns="" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.257 [INFO][4784] k8s.go 585: Releasing IP address(es) ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.257 [INFO][4784] utils.go 188: Calico CNI releasing IP address ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.273 [INFO][4790] ipam_plugin.go 415: Releasing address using handleID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.273 [INFO][4790] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.273 [INFO][4790] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.282 [WARNING][4790] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.282 [INFO][4790] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" HandleID="k8s-pod-network.5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Workload="ci--3510.3.2--a--a099f8e901-k8s-coredns--787d4945fb--ngpf7-eth0" Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.283 [INFO][4790] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.286029 env[1350]: 2024-02-09 10:27:40.284 [INFO][4784] k8s.go 591: Teardown processing complete. ContainerID="5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23" Feb 9 10:27:40.286591 env[1350]: time="2024-02-09T10:27:40.286053921Z" level=info msg="TearDown network for sandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" successfully" Feb 9 10:27:40.294411 env[1350]: time="2024-02-09T10:27:40.294372625Z" level=info msg="RemovePodSandbox \"5efbe3fffe790b9d89ecf010d455dbf1fff99ee0ce9f5c42d9724b71813d6d23\" returns successfully" Feb 9 10:27:40.294945 env[1350]: time="2024-02-09T10:27:40.294899324Z" level=info msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.326 [WARNING][4808] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0", GenerateName:"calico-kube-controllers-7b896cb6f8-", Namespace:"calico-system", SelfLink:"", UID:"843f5a8d-1bdb-435a-8378-96f0394b1bca", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b896cb6f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32", Pod:"calico-kube-controllers-7b896cb6f8-dpq9n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa1df87e39a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.327 [INFO][4808] k8s.go 578: Cleaning up netns ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.327 [INFO][4808] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" iface="eth0" netns="" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.327 [INFO][4808] k8s.go 585: Releasing IP address(es) ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.327 [INFO][4808] utils.go 188: Calico CNI releasing IP address ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.343 [INFO][4814] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.343 [INFO][4814] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.343 [INFO][4814] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.353 [WARNING][4814] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.353 [INFO][4814] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.356 [INFO][4814] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.358726 env[1350]: 2024-02-09 10:27:40.357 [INFO][4808] k8s.go 591: Teardown processing complete. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.359312 env[1350]: time="2024-02-09T10:27:40.359279371Z" level=info msg="TearDown network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" successfully" Feb 9 10:27:40.359384 env[1350]: time="2024-02-09T10:27:40.359367928Z" level=info msg="StopPodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" returns successfully" Feb 9 10:27:40.359912 env[1350]: time="2024-02-09T10:27:40.359879787Z" level=info msg="RemovePodSandbox for \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" Feb 9 10:27:40.359990 env[1350]: time="2024-02-09T10:27:40.359915546Z" level=info msg="Forcibly stopping sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\"" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.397 [WARNING][4834] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0", GenerateName:"calico-kube-controllers-7b896cb6f8-", Namespace:"calico-system", SelfLink:"", UID:"843f5a8d-1bdb-435a-8378-96f0394b1bca", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 0, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b896cb6f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"3c9a00ccc1c7ab28bf78a767e2f0c29098f8bafa31e394cd7986274d34623f32", Pod:"calico-kube-controllers-7b896cb6f8-dpq9n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa1df87e39a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.397 [INFO][4834] k8s.go 578: Cleaning up netns ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.397 [INFO][4834] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" iface="eth0" netns="" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.397 [INFO][4834] k8s.go 585: Releasing IP address(es) ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.397 [INFO][4834] utils.go 188: Calico CNI releasing IP address ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.414 [INFO][4840] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.414 [INFO][4840] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.414 [INFO][4840] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.423 [WARNING][4840] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.423 [INFO][4840] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" HandleID="k8s-pod-network.8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--kube--controllers--7b896cb6f8--dpq9n-eth0" Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.424 [INFO][4840] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:40.426871 env[1350]: 2024-02-09 10:27:40.425 [INFO][4834] k8s.go 591: Teardown processing complete. ContainerID="8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73" Feb 9 10:27:40.428981 env[1350]: time="2024-02-09T10:27:40.428933606Z" level=info msg="TearDown network for sandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" successfully" Feb 9 10:27:40.440432 env[1350]: time="2024-02-09T10:27:40.440388824Z" level=info msg="RemovePodSandbox \"8b4843a45959b1792e1c6d9aff0b442c118185da095cf38f906705686bc9bc73\" returns successfully" Feb 9 10:27:41.391000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.396881 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 10:27:41.397013 kernel: audit: type=1400 audit(1707474461.391:1334): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.391000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.440838 kernel: audit: type=1400 audit(1707474461.391:1335): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.440943 kernel: audit: type=1300 audit(1707474461.391:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167c500 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167c500 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.493988 kernel: audit: type=1327 audit(1707474461.391:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.391000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.516116 kernel: audit: type=1400 audit(1707474461.391:1336): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.516229 kernel: audit: type=1300 audit(1707474461.391:1336): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167c520 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167c520 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.568307 kernel: audit: type=1327 audit(1707474461.391:1336): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.568759 kernel: audit: type=1300 audit(1707474461.391:1335): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001051860 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001051860 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.622593 kernel: audit: type=1327 audit(1707474461.391:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:41.404000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.647928 kernel: audit: type=1400 audit(1707474461.404:1337): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:27:41.404000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167c840 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:27:41.404000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:27:43.506045 kubelet[2478]: I0209 10:27:43.506012 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:43.511424 systemd[1]: Created slice kubepods-besteffort-podec1017f3_3326_44a5_b339_cc672a69e1f2.slice. Feb 9 10:27:43.524157 kubelet[2478]: W0209 10:27:43.524100 2478 reflector.go:424] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-a099f8e901" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-a099f8e901' and this object Feb 9 10:27:43.524325 kubelet[2478]: E0209 10:27:43.524314 2478 reflector.go:140] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-a099f8e901" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-a099f8e901' and this object Feb 9 10:27:43.524637 kubelet[2478]: W0209 10:27:43.524614 2478 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-a099f8e901" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-a099f8e901' and this object Feb 9 10:27:43.524637 kubelet[2478]: E0209 10:27:43.524638 2478 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-a099f8e901" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-a099f8e901' and this object Feb 9 10:27:43.535871 kubelet[2478]: I0209 10:27:43.535839 2478 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:27:43.540538 systemd[1]: Created slice kubepods-besteffort-pod75c44c69_5d27_4a29_858e_01bd24064b38.slice. Feb 9 10:27:43.575000 audit[4880]: NETFILTER_CFG table=filter:126 family=2 entries=7 op=nft_register_rule pid=4880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:43.575000 audit[4880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffc07a4ec0 a2=0 a3=ffffb087e6c0 items=0 ppid=2634 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:43.576000 audit[4880]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=4880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:43.576000 audit[4880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc07a4ec0 a2=0 a3=ffffb087e6c0 items=0 ppid=2634 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:43.618000 audit[4906]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:43.618000 audit[4906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe8139bb0 a2=0 a3=ffffa6d806c0 items=0 ppid=2634 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:43.620000 audit[4906]: NETFILTER_CFG table=nat:129 family=2 entries=78 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:43.620000 audit[4906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe8139bb0 a2=0 a3=ffffa6d806c0 items=0 ppid=2634 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:43.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:43.632695 kubelet[2478]: I0209 10:27:43.632655 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s227v\" (UniqueName: \"kubernetes.io/projected/ec1017f3-3326-44a5-b339-cc672a69e1f2-kube-api-access-s227v\") pod \"calico-apiserver-5c99468c5f-g855j\" (UID: \"ec1017f3-3326-44a5-b339-cc672a69e1f2\") " pod="calico-apiserver/calico-apiserver-5c99468c5f-g855j" Feb 9 10:27:43.632863 kubelet[2478]: I0209 10:27:43.632850 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxjgz\" (UniqueName: \"kubernetes.io/projected/75c44c69-5d27-4a29-858e-01bd24064b38-kube-api-access-xxjgz\") pod \"calico-apiserver-5c99468c5f-9g75z\" (UID: \"75c44c69-5d27-4a29-858e-01bd24064b38\") " pod="calico-apiserver/calico-apiserver-5c99468c5f-9g75z" Feb 9 10:27:43.632990 kubelet[2478]: I0209 10:27:43.632979 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ec1017f3-3326-44a5-b339-cc672a69e1f2-calico-apiserver-certs\") pod \"calico-apiserver-5c99468c5f-g855j\" (UID: \"ec1017f3-3326-44a5-b339-cc672a69e1f2\") " pod="calico-apiserver/calico-apiserver-5c99468c5f-g855j" Feb 9 10:27:43.633107 kubelet[2478]: I0209 10:27:43.633097 2478 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/75c44c69-5d27-4a29-858e-01bd24064b38-calico-apiserver-certs\") pod \"calico-apiserver-5c99468c5f-9g75z\" (UID: \"75c44c69-5d27-4a29-858e-01bd24064b38\") " pod="calico-apiserver/calico-apiserver-5c99468c5f-9g75z" Feb 9 10:27:44.237154 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.LJipaR.mount: Deactivated successfully. Feb 9 10:27:44.736469 kubelet[2478]: E0209 10:27:44.736435 2478 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 10:27:44.736973 kubelet[2478]: E0209 10:27:44.736531 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/75c44c69-5d27-4a29-858e-01bd24064b38-calico-apiserver-certs podName:75c44c69-5d27-4a29-858e-01bd24064b38 nodeName:}" failed. No retries permitted until 2024-02-09 10:27:45.236509032 +0000 UTC m=+65.569746647 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/75c44c69-5d27-4a29-858e-01bd24064b38-calico-apiserver-certs") pod "calico-apiserver-5c99468c5f-9g75z" (UID: "75c44c69-5d27-4a29-858e-01bd24064b38") : failed to sync secret cache: timed out waiting for the condition Feb 9 10:27:44.736973 kubelet[2478]: E0209 10:27:44.736785 2478 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 10:27:44.736973 kubelet[2478]: E0209 10:27:44.736818 2478 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ec1017f3-3326-44a5-b339-cc672a69e1f2-calico-apiserver-certs podName:ec1017f3-3326-44a5-b339-cc672a69e1f2 nodeName:}" failed. No retries permitted until 2024-02-09 10:27:45.23680878 +0000 UTC m=+65.570046395 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ec1017f3-3326-44a5-b339-cc672a69e1f2-calico-apiserver-certs") pod "calico-apiserver-5c99468c5f-g855j" (UID: "ec1017f3-3326-44a5-b339-cc672a69e1f2") : failed to sync secret cache: timed out waiting for the condition Feb 9 10:27:45.315707 env[1350]: time="2024-02-09T10:27:45.315639692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c99468c5f-g855j,Uid:ec1017f3-3326-44a5-b339-cc672a69e1f2,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:27:45.343978 env[1350]: time="2024-02-09T10:27:45.343929565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c99468c5f-9g75z,Uid:75c44c69-5d27-4a29-858e-01bd24064b38,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:27:45.547101 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:45.547214 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8716717b07c: link becomes ready Feb 9 10:27:45.532710 systemd-networkd[1495]: cali8716717b07c: Link UP Feb 9 10:27:45.553781 systemd-networkd[1495]: cali8716717b07c: Gained carrier Feb 9 10:27:45.573261 systemd-networkd[1495]: calib51f4e43d49: Link UP Feb 9 10:27:45.583729 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib51f4e43d49: link becomes ready Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.408 [INFO][4929] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0 calico-apiserver-5c99468c5f- calico-apiserver ec1017f3-3326-44a5-b339-cc672a69e1f2 826 0 2024-02-09 10:27:43 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c99468c5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 calico-apiserver-5c99468c5f-g855j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8716717b07c [] []}} ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.408 [INFO][4929] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.467 [INFO][4956] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" HandleID="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.479 [INFO][4956] ipam_plugin.go 268: Auto assigning IP ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" HandleID="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc450), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-a099f8e901", "pod":"calico-apiserver-5c99468c5f-g855j", "timestamp":"2024-02-09 10:27:45.467313425 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.480 [INFO][4956] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.480 [INFO][4956] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.480 [INFO][4956] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.481 [INFO][4956] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.491 [INFO][4956] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.501 [INFO][4956] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.504 [INFO][4956] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.507 [INFO][4956] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.508 [INFO][4956] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.510 [INFO][4956] ipam.go 1682: Creating new handle: k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.513 [INFO][4956] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.519 [INFO][4956] ipam.go 1216: Successfully claimed IPs: [192.168.71.133/26] block=192.168.71.128/26 handle="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.519 [INFO][4956] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.133/26] handle="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.519 [INFO][4956] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:45.585868 env[1350]: 2024-02-09 10:27:45.519 [INFO][4956] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.133/26] IPv6=[] ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" HandleID="k8s-pod-network.84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.522 [INFO][4929] k8s.go 385: Populated endpoint ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0", GenerateName:"calico-apiserver-5c99468c5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ec1017f3-3326-44a5-b339-cc672a69e1f2", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c99468c5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"calico-apiserver-5c99468c5f-g855j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8716717b07c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.522 [INFO][4929] k8s.go 386: Calico CNI using IPs: [192.168.71.133/32] ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.522 [INFO][4929] dataplane_linux.go 68: Setting the host side veth name to cali8716717b07c ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.558 [INFO][4929] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.558 [INFO][4929] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0", GenerateName:"calico-apiserver-5c99468c5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ec1017f3-3326-44a5-b339-cc672a69e1f2", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c99468c5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee", Pod:"calico-apiserver-5c99468c5f-g855j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8716717b07c", MAC:"be:a4:37:0c:eb:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:45.586502 env[1350]: 2024-02-09 10:27:45.571 [INFO][4929] k8s.go 491: Wrote updated endpoint to datastore ContainerID="84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-g855j" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--g855j-eth0" Feb 9 10:27:45.590442 systemd-networkd[1495]: calib51f4e43d49: Gained carrier Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.447 [INFO][4942] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0 calico-apiserver-5c99468c5f- calico-apiserver 75c44c69-5d27-4a29-858e-01bd24064b38 830 0 2024-02-09 10:27:43 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c99468c5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-a099f8e901 calico-apiserver-5c99468c5f-9g75z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib51f4e43d49 [] []}} ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.448 [INFO][4942] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.491 [INFO][4962] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" HandleID="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.506 [INFO][4962] ipam_plugin.go 268: Auto assigning IP ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" HandleID="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004f90b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-a099f8e901", "pod":"calico-apiserver-5c99468c5f-9g75z", "timestamp":"2024-02-09 10:27:45.491754126 +0000 UTC"}, Hostname:"ci-3510.3.2-a-a099f8e901", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.507 [INFO][4962] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.519 [INFO][4962] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.519 [INFO][4962] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-a099f8e901' Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.522 [INFO][4962] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.529 [INFO][4962] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.533 [INFO][4962] ipam.go 489: Trying affinity for 192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.540 [INFO][4962] ipam.go 155: Attempting to load block cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.545 [INFO][4962] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.545 [INFO][4962] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.546 [INFO][4962] ipam.go 1682: Creating new handle: k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838 Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.550 [INFO][4962] ipam.go 1203: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.557 [INFO][4962] ipam.go 1216: Successfully claimed IPs: [192.168.71.134/26] block=192.168.71.128/26 handle="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.557 [INFO][4962] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.71.134/26] handle="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" host="ci-3510.3.2-a-a099f8e901" Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.557 [INFO][4962] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:27:45.603332 env[1350]: 2024-02-09 10:27:45.557 [INFO][4962] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.71.134/26] IPv6=[] ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" HandleID="k8s-pod-network.620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Workload="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.560 [INFO][4942] k8s.go 385: Populated endpoint ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0", GenerateName:"calico-apiserver-5c99468c5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"75c44c69-5d27-4a29-858e-01bd24064b38", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c99468c5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"", Pod:"calico-apiserver-5c99468c5f-9g75z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib51f4e43d49", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.560 [INFO][4942] k8s.go 386: Calico CNI using IPs: [192.168.71.134/32] ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.560 [INFO][4942] dataplane_linux.go 68: Setting the host side veth name to calib51f4e43d49 ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.587 [INFO][4942] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.590 [INFO][4942] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0", GenerateName:"calico-apiserver-5c99468c5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"75c44c69-5d27-4a29-858e-01bd24064b38", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 27, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c99468c5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-a099f8e901", ContainerID:"620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838", Pod:"calico-apiserver-5c99468c5f-9g75z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib51f4e43d49", MAC:"e2:e0:61:1b:2b:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:27:45.603988 env[1350]: 2024-02-09 10:27:45.600 [INFO][4942] k8s.go 491: Wrote updated endpoint to datastore ContainerID="620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838" Namespace="calico-apiserver" Pod="calico-apiserver-5c99468c5f-9g75z" WorkloadEndpoint="ci--3510.3.2--a--a099f8e901-k8s-calico--apiserver--5c99468c5f--9g75z-eth0" Feb 9 10:27:45.617555 env[1350]: time="2024-02-09T10:27:45.617384780Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:45.617555 env[1350]: time="2024-02-09T10:27:45.617466137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:45.617555 env[1350]: time="2024-02-09T10:27:45.617478337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:45.617984 env[1350]: time="2024-02-09T10:27:45.617927519Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee pid=5005 runtime=io.containerd.runc.v2 Feb 9 10:27:45.620148 env[1350]: time="2024-02-09T10:27:45.620061237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:27:45.620243 env[1350]: time="2024-02-09T10:27:45.620169273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:27:45.620243 env[1350]: time="2024-02-09T10:27:45.620196632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:27:45.620383 env[1350]: time="2024-02-09T10:27:45.620345866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838 pid=5020 runtime=io.containerd.runc.v2 Feb 9 10:27:45.632315 systemd[1]: Started cri-containerd-84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee.scope. Feb 9 10:27:45.649372 systemd[1]: Started cri-containerd-620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838.scope. Feb 9 10:27:45.663000 audit[5049]: NETFILTER_CFG table=filter:130 family=2 entries=59 op=nft_register_chain pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:45.663000 audit[5049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd94fa1d0 a2=0 a3=ffff84905fa8 items=0 ppid=4260 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.670000 audit: BPF prog-id=180 op=LOAD Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5005 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613165626663323733646663663036326165323136303634636639 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5005 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613165626663323733646663663036326165323136303634636639 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit: BPF prog-id=181 op=LOAD Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit: BPF prog-id=182 op=LOAD Feb 9 10:27:45.671000 audit[5033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5005 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613165626663323733646663663036326165323136303634636639 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.671000 audit: BPF prog-id=183 op=LOAD Feb 9 10:27:45.671000 audit[5033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5005 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613165626663323733646663663036326165323136303634636639 Feb 9 10:27:45.671000 audit: BPF prog-id=183 op=UNLOAD Feb 9 10:27:45.671000 audit: BPF prog-id=182 op=UNLOAD Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.673000 audit: BPF prog-id=184 op=LOAD Feb 9 10:27:45.673000 audit[5033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5005 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613165626663323733646663663036326165323136303634636639 Feb 9 10:27:45.674000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.674000 audit[5034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5020 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303039326534396532656366336539633261326531353033326130 Feb 9 10:27:45.674000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.674000 audit[5034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5020 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303039326534396532656366336539633261326531353033326130 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.676000 audit: BPF prog-id=185 op=LOAD Feb 9 10:27:45.676000 audit[5034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5020 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303039326534396532656366336539633261326531353033326130 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.677000 audit: BPF prog-id=186 op=LOAD Feb 9 10:27:45.677000 audit[5034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5020 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303039326534396532656366336539633261326531353033326130 Feb 9 10:27:45.678000 audit: BPF prog-id=186 op=UNLOAD Feb 9 10:27:45.678000 audit: BPF prog-id=185 op=UNLOAD Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:45.678000 audit: BPF prog-id=187 op=LOAD Feb 9 10:27:45.678000 audit[5034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5020 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632303039326534396532656366336539633261326531353033326130 Feb 9 10:27:45.699672 env[1350]: time="2024-02-09T10:27:45.699630781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c99468c5f-g855j,Uid:ec1017f3-3326-44a5-b339-cc672a69e1f2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee\"" Feb 9 10:27:45.701951 env[1350]: time="2024-02-09T10:27:45.701909373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:27:45.706000 audit[5079]: NETFILTER_CFG table=filter:131 family=2 entries=50 op=nft_register_chain pid=5079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:27:45.706000 audit[5079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffe249a600 a2=0 a3=ffffaf35cfa8 items=0 ppid=4260 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:27:45.717869 env[1350]: time="2024-02-09T10:27:45.717820122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c99468c5f-9g75z,Uid:75c44c69-5d27-4a29-858e-01bd24064b38,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838\"" Feb 9 10:27:47.032810 systemd-networkd[1495]: cali8716717b07c: Gained IPv6LL Feb 9 10:27:47.224878 systemd-networkd[1495]: calib51f4e43d49: Gained IPv6LL Feb 9 10:27:48.013017 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.oRhbDR.mount: Deactivated successfully. Feb 9 10:27:48.862094 env[1350]: time="2024-02-09T10:27:48.862042864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:48.870972 env[1350]: time="2024-02-09T10:27:48.870943211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:48.875950 env[1350]: time="2024-02-09T10:27:48.875925945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:48.880552 env[1350]: time="2024-02-09T10:27:48.880528692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:48.881266 env[1350]: time="2024-02-09T10:27:48.881240826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:27:48.882853 env[1350]: time="2024-02-09T10:27:48.882820847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:27:48.883882 env[1350]: time="2024-02-09T10:27:48.883852448Z" level=info msg="CreateContainer within sandbox \"84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:27:48.914194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4000663550.mount: Deactivated successfully. Feb 9 10:27:48.924431 env[1350]: time="2024-02-09T10:27:48.924383491Z" level=info msg="CreateContainer within sandbox \"84a1ebfc273dfcf062ae216064cf927b3ca02d0188c2dcb16b715a458cd249ee\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26\"" Feb 9 10:27:48.926328 env[1350]: time="2024-02-09T10:27:48.925125823Z" level=info msg="StartContainer for \"9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26\"" Feb 9 10:27:48.947282 systemd[1]: Started cri-containerd-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26.scope. Feb 9 10:27:48.974877 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 10:27:48.975026 kernel: audit: type=1400 audit(1707474468.966:1380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.014558 kernel: audit: type=1400 audit(1707474468.966:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.034570 kernel: audit: type=1400 audit(1707474468.966:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.054093 kernel: audit: type=1400 audit(1707474468.966:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.054747 kernel: audit: type=1400 audit(1707474468.966:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.091807 kernel: audit: type=1400 audit(1707474468.966:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.109404 kernel: audit: type=1400 audit(1707474468.966:1386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.128885 kernel: audit: type=1400 audit(1707474468.966:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.147050 kernel: audit: type=1400 audit(1707474468.966:1388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.165808 kernel: audit: type=1400 audit(1707474468.974:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit: BPF prog-id=188 op=LOAD Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5005 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303261313439393763616162633337333835613461336462366439 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5005 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303261313439393763616162633337333835613461336462366439 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.974000 audit: BPF prog-id=189 op=LOAD Feb 9 10:27:48.974000 audit[5114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5005 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303261313439393763616162633337333835613461336462366439 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.993000 audit: BPF prog-id=190 op=LOAD Feb 9 10:27:48.993000 audit[5114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5005 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303261313439393763616162633337333835613461336462366439 Feb 9 10:27:48.993000 audit: BPF prog-id=190 op=UNLOAD Feb 9 10:27:48.993000 audit: BPF prog-id=189 op=UNLOAD Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { perfmon } for pid=5114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit[5114]: AVC avc: denied { bpf } for pid=5114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:48.994000 audit: BPF prog-id=191 op=LOAD Feb 9 10:27:48.994000 audit[5114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5005 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:48.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303261313439393763616162633337333835613461336462366439 Feb 9 10:27:49.177068 env[1350]: time="2024-02-09T10:27:49.177027088Z" level=info msg="StartContainer for \"9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26\" returns successfully" Feb 9 10:27:49.329274 env[1350]: time="2024-02-09T10:27:49.329233077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:49.335298 env[1350]: time="2024-02-09T10:27:49.335269333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:49.338599 env[1350]: time="2024-02-09T10:27:49.338561451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:49.342225 env[1350]: time="2024-02-09T10:27:49.342186796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:27:49.342787 env[1350]: time="2024-02-09T10:27:49.342762815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:27:49.345530 env[1350]: time="2024-02-09T10:27:49.345495193Z" level=info msg="CreateContainer within sandbox \"620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:27:49.383456 env[1350]: time="2024-02-09T10:27:49.383350948Z" level=info msg="CreateContainer within sandbox \"620092e49e2ecf3e9c2a2e15032a0333b388d7c7b404b8cd4ca87a9f048cf838\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0\"" Feb 9 10:27:49.384184 env[1350]: time="2024-02-09T10:27:49.384160078Z" level=info msg="StartContainer for \"59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0\"" Feb 9 10:27:49.418127 systemd[1]: Started cri-containerd-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0.scope. Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.440000 audit: BPF prog-id=192 op=LOAD Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5020 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633339393432636534626565613236623938613238643831643334 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5020 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633339393432636534626565613236623938613238643831643334 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit: BPF prog-id=193 op=LOAD Feb 9 10:27:49.441000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5020 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633339393432636534626565613236623938613238643831643334 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit: BPF prog-id=194 op=LOAD Feb 9 10:27:49.441000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5020 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633339393432636534626565613236623938613238643831643334 Feb 9 10:27:49.441000 audit: BPF prog-id=194 op=UNLOAD Feb 9 10:27:49.441000 audit: BPF prog-id=193 op=UNLOAD Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { perfmon } for pid=5154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit[5154]: AVC avc: denied { bpf } for pid=5154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:27:49.441000 audit: BPF prog-id=195 op=LOAD Feb 9 10:27:49.441000 audit[5154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5020 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:49.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633339393432636534626565613236623938613238643831643334 Feb 9 10:27:49.473008 env[1350]: time="2024-02-09T10:27:49.472944262Z" level=info msg="StartContainer for \"59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0\" returns successfully" Feb 9 10:27:50.010037 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.HUnuDH.mount: Deactivated successfully. Feb 9 10:27:50.207603 kubelet[2478]: I0209 10:27:50.207573 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c99468c5f-g855j" podStartSLOduration=-9.22337202964725e+09 pod.CreationTimestamp="2024-02-09 10:27:43 +0000 UTC" firstStartedPulling="2024-02-09 10:27:45.701339915 +0000 UTC m=+66.034577530" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:50.188933536 +0000 UTC m=+70.522171111" watchObservedRunningTime="2024-02-09 10:27:50.207527212 +0000 UTC m=+70.540764827" Feb 9 10:27:50.208122 kubelet[2478]: I0209 10:27:50.208107 2478 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c99468c5f-9g75z" podStartSLOduration=-9.223372029646694e+09 pod.CreationTimestamp="2024-02-09 10:27:43 +0000 UTC" firstStartedPulling="2024-02-09 10:27:45.719091153 +0000 UTC m=+66.052328768" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:27:50.206435252 +0000 UTC m=+70.539672867" watchObservedRunningTime="2024-02-09 10:27:50.208082071 +0000 UTC m=+70.541319686" Feb 9 10:27:50.385000 audit[5209]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:50.385000 audit[5209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe1617b80 a2=0 a3=ffff956d66c0 items=0 ppid=2634 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:50.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:50.387000 audit[5209]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:50.387000 audit[5209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe1617b80 a2=0 a3=ffff956d66c0 items=0 ppid=2634 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:50.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:50.496000 audit[5126]: AVC avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:27:50.496000 audit[5126]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a99ba0 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:27:50.496000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:27:50.502000 audit[5235]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:50.502000 audit[5235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffff334830 a2=0 a3=ffff9b7b56c0 items=0 ppid=2634 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:50.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:50.507000 audit[5235]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=5235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:27:50.507000 audit[5235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffff334830 a2=0 a3=ffff9b7b56c0 items=0 ppid=2634 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:50.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:27:50.881000 audit[5164]: AVC avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:27:50.881000 audit[5164]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ebb340 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:27:50.881000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:09.461441 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.XGkk3N.mount: Deactivated successfully. Feb 9 10:28:14.239021 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.edyaM4.mount: Deactivated successfully. Feb 9 10:28:15.330410 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.7K3KSy.mount: Deactivated successfully. Feb 9 10:28:15.364860 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.faT6PD.mount: Deactivated successfully. Feb 9 10:28:15.450000 audit[5372]: NETFILTER_CFG table=filter:136 family=2 entries=7 op=nft_register_rule pid=5372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.456609 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 10:28:15.456734 kernel: audit: type=1325 audit(1707474495.450:1422): table=filter:136 family=2 entries=7 op=nft_register_rule pid=5372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.450000 audit[5372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc910f020 a2=0 a3=ffffae5006c0 items=0 ppid=2634 pid=5372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.497965 kernel: audit: type=1300 audit(1707474495.450:1422): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc910f020 a2=0 a3=ffffae5006c0 items=0 ppid=2634 pid=5372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.498787 kernel: audit: type=1327 audit(1707474495.450:1422): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.471000 audit[5372]: NETFILTER_CFG table=nat:137 family=2 entries=85 op=nft_register_chain pid=5372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.527708 kernel: audit: type=1325 audit(1707474495.471:1423): table=nat:137 family=2 entries=85 op=nft_register_chain pid=5372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.471000 audit[5372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=ffffc910f020 a2=0 a3=ffffae5006c0 items=0 ppid=2634 pid=5372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.561536 kernel: audit: type=1300 audit(1707474495.471:1423): arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=ffffc910f020 a2=0 a3=ffffae5006c0 items=0 ppid=2634 pid=5372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.583938 kernel: audit: type=1327 audit(1707474495.471:1423): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.611000 audit[5398]: NETFILTER_CFG table=filter:138 family=2 entries=6 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.627789 kernel: audit: type=1325 audit(1707474495.611:1424): table=filter:138 family=2 entries=6 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.627914 kernel: audit: type=1300 audit(1707474495.611:1424): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff6a09f30 a2=0 a3=ffff87e3c6c0 items=0 ppid=2634 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.611000 audit[5398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff6a09f30 a2=0 a3=ffff87e3c6c0 items=0 ppid=2634 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.668209 kernel: audit: type=1327 audit(1707474495.611:1424): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:15.668345 kernel: audit: type=1325 audit(1707474495.617:1425): table=nat:139 family=2 entries=92 op=nft_register_chain pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.617000 audit[5398]: NETFILTER_CFG table=nat:139 family=2 entries=92 op=nft_register_chain pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:28:15.617000 audit[5398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=fffff6a09f30 a2=0 a3=ffff87e3c6c0 items=0 ppid=2634 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:15.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:28:35.738000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:35.744261 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:28:35.744359 kernel: audit: type=1400 audit(1707474515.738:1426): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:35.738000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002804cc0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:35.794522 kernel: audit: type=1300 audit(1707474515.738:1426): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002804cc0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:35.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:35.819564 kernel: audit: type=1327 audit(1707474515.738:1426): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:35.765000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:35.842446 kernel: audit: type=1400 audit(1707474515.765:1427): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:35.765000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002741260 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:35.871772 kernel: audit: type=1300 audit(1707474515.765:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002741260 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:35.765000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:35.897980 kernel: audit: type=1327 audit(1707474515.765:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:36.693000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.694000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.741976 kernel: audit: type=1400 audit(1707474516.693:1428): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.742103 kernel: audit: type=1400 audit(1707474516.694:1429): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.742144 kernel: audit: type=1300 audit(1707474516.694:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4004062140 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.694000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4004062140 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.694000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.793045 kernel: audit: type=1327 audit(1707474516.694:1429): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.693000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40115f7e30 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.707000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.707000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4016400f30 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.707000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.710000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.710000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4017208000 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.713000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.713000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4004062180 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.713000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:36.722000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:36.722000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4017208120 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:28:36.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:28:39.461518 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.TFU1Mn.mount: Deactivated successfully. Feb 9 10:28:41.392000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.397782 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 10:28:41.397885 kernel: audit: type=1400 audit(1707474521.392:1434): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.392000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.443644 kernel: audit: type=1400 audit(1707474521.392:1435): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.392000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40027e6800 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.498059 kernel: audit: type=1300 audit(1707474521.392:1434): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40027e6800 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.498166 kernel: audit: type=1327 audit(1707474521.392:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.498211 kernel: audit: type=1400 audit(1707474521.392:1436): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.392000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.392000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40027e6920 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.550107 kernel: audit: type=1300 audit(1707474521.392:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40027e6920 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.575148 kernel: audit: type=1327 audit(1707474521.392:1436): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.392000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028057c0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.606217 kernel: audit: type=1300 audit(1707474521.392:1435): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028057c0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.630510 kernel: audit: type=1327 audit(1707474521.392:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:41.403000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.653076 kernel: audit: type=1400 audit(1707474521.403:1437): avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:28:41.403000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027e6b40 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:28:41.403000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:28:44.237319 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.soTYAC.mount: Deactivated successfully. Feb 9 10:28:45.330102 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.q7jxgU.mount: Deactivated successfully. Feb 9 10:28:46.326621 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.3d38hb.mount: Deactivated successfully. Feb 9 10:28:48.015002 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.tOzlyr.mount: Deactivated successfully. Feb 9 10:28:50.496000 audit[5126]: AVC avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:28:50.502599 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:28:50.502660 kernel: audit: type=1400 audit(1707474530.496:1438): avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:28:50.496000 audit[5126]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f33140 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:28:50.554961 kernel: audit: type=1300 audit(1707474530.496:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f33140 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:28:50.496000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:50.579762 kernel: audit: type=1327 audit(1707474530.496:1438): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:50.882000 audit[5164]: AVC avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:28:50.882000 audit[5164]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40017fc940 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:28:50.934509 kernel: audit: type=1400 audit(1707474530.882:1439): avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:28:50.934630 kernel: audit: type=1300 audit(1707474530.882:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40017fc940 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:28:50.934679 kernel: audit: type=1327 audit(1707474530.882:1439): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:28:50.882000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:29:09.461259 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.GpiwQ6.mount: Deactivated successfully. Feb 9 10:29:14.244501 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.3eOQJQ.mount: Deactivated successfully. Feb 9 10:29:15.334316 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.dHVdGO.mount: Deactivated successfully. Feb 9 10:29:16.328971 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.ThnLPM.mount: Deactivated successfully. Feb 9 10:29:20.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.12:22-10.200.12.6:57396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.127269 systemd[1]: Started sshd@7-10.200.20.12:22-10.200.12.6:57396.service. Feb 9 10:29:20.149869 kernel: audit: type=1130 audit(1707474560.126:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.12:22-10.200.12.6:57396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.566000 audit[5621]: USER_ACCT pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.567747 sshd[5621]: Accepted publickey for core from 10.200.12.6 port 57396 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:20.592415 sshd[5621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:20.592774 kernel: audit: type=1101 audit(1707474560.566:1441): pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.592835 kernel: audit: type=1103 audit(1707474560.591:1442): pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.591000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.628463 kernel: audit: type=1006 audit(1707474560.591:1443): pid=5621 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 10:29:20.591000 audit[5621]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4dad0e0 a2=3 a3=1 items=0 ppid=1 pid=5621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:20.633835 systemd[1]: Started session-10.scope. Feb 9 10:29:20.635142 systemd-logind[1338]: New session 10 of user core. Feb 9 10:29:20.652848 kernel: audit: type=1300 audit(1707474560.591:1443): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4dad0e0 a2=3 a3=1 items=0 ppid=1 pid=5621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:20.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:20.662775 kernel: audit: type=1327 audit(1707474560.591:1443): proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:20.641000 audit[5621]: USER_START pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.687897 kernel: audit: type=1105 audit(1707474560.641:1444): pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.642000 audit[5623]: CRED_ACQ pid=5623 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.709143 kernel: audit: type=1103 audit(1707474560.642:1445): pid=5623 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:21.028924 sshd[5621]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:21.029000 audit[5621]: USER_END pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:21.032521 systemd-logind[1338]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:29:21.033789 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:29:21.035047 systemd-logind[1338]: Removed session 10. Feb 9 10:29:21.035759 systemd[1]: sshd@7-10.200.20.12:22-10.200.12.6:57396.service: Deactivated successfully. Feb 9 10:29:21.030000 audit[5621]: CRED_DISP pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:21.080863 kernel: audit: type=1106 audit(1707474561.029:1446): pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:21.080996 kernel: audit: type=1104 audit(1707474561.030:1447): pid=5621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:21.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.12:22-10.200.12.6:57396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:26.135316 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:29:26.135468 kernel: audit: type=1130 audit(1707474566.108:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.12:22-10.200.12.6:57400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:26.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.12:22-10.200.12.6:57400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:26.109790 systemd[1]: Started sshd@8-10.200.20.12:22-10.200.12.6:57400.service. Feb 9 10:29:26.554000 audit[5636]: USER_ACCT pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.557675 sshd[5636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:26.558339 sshd[5636]: Accepted publickey for core from 10.200.12.6 port 57400 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:26.555000 audit[5636]: CRED_ACQ pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.601008 kernel: audit: type=1101 audit(1707474566.554:1450): pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.601188 kernel: audit: type=1103 audit(1707474566.555:1451): pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.601217 kernel: audit: type=1006 audit(1707474566.555:1452): pid=5636 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 10:29:26.555000 audit[5636]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4cfd680 a2=3 a3=1 items=0 ppid=1 pid=5636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:26.638937 kernel: audit: type=1300 audit(1707474566.555:1452): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4cfd680 a2=3 a3=1 items=0 ppid=1 pid=5636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:26.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:26.642251 systemd[1]: Started session-11.scope. Feb 9 10:29:26.643758 systemd-logind[1338]: New session 11 of user core. Feb 9 10:29:26.648280 kernel: audit: type=1327 audit(1707474566.555:1452): proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:26.647000 audit[5636]: USER_START pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.674000 audit[5639]: CRED_ACQ pid=5639 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.697734 kernel: audit: type=1105 audit(1707474566.647:1453): pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:26.697860 kernel: audit: type=1103 audit(1707474566.674:1454): pid=5639 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:27.001094 sshd[5636]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:27.000000 audit[5636]: USER_END pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:27.004231 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:29:27.005032 systemd[1]: sshd@8-10.200.20.12:22-10.200.12.6:57400.service: Deactivated successfully. Feb 9 10:29:27.001000 audit[5636]: CRED_DISP pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:27.028811 systemd-logind[1338]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:29:27.029742 systemd-logind[1338]: Removed session 11. Feb 9 10:29:27.048747 kernel: audit: type=1106 audit(1707474567.000:1455): pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:27.048871 kernel: audit: type=1104 audit(1707474567.001:1456): pid=5636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:27.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.12:22-10.200.12.6:57400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:32.075194 systemd[1]: Started sshd@9-10.200.20.12:22-10.200.12.6:43308.service. Feb 9 10:29:32.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.12:22-10.200.12.6:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:32.081248 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:29:32.102296 kernel: audit: type=1130 audit(1707474572.074:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.12:22-10.200.12.6:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:32.524000 audit[5650]: USER_ACCT pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.525257 sshd[5650]: Accepted publickey for core from 10.200.12.6 port 43308 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:32.527058 sshd[5650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:32.526000 audit[5650]: CRED_ACQ pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.572581 kernel: audit: type=1101 audit(1707474572.524:1459): pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.572886 kernel: audit: type=1103 audit(1707474572.526:1460): pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.573533 kernel: audit: type=1006 audit(1707474572.526:1461): pid=5650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 10:29:32.526000 audit[5650]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0f2d900 a2=3 a3=1 items=0 ppid=1 pid=5650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.589822 systemd[1]: Started session-12.scope. Feb 9 10:29:32.590742 systemd-logind[1338]: New session 12 of user core. Feb 9 10:29:32.612118 kernel: audit: type=1300 audit(1707474572.526:1461): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0f2d900 a2=3 a3=1 items=0 ppid=1 pid=5650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:32.621035 kernel: audit: type=1327 audit(1707474572.526:1461): proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:32.621127 kernel: audit: type=1105 audit(1707474572.594:1462): pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.594000 audit[5650]: USER_START pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.596000 audit[5652]: CRED_ACQ pid=5652 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.670427 kernel: audit: type=1103 audit(1707474572.596:1463): pid=5652 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.936911 sshd[5650]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:32.937000 audit[5650]: USER_END pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.942314 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:29:32.943062 systemd[1]: sshd@9-10.200.20.12:22-10.200.12.6:43308.service: Deactivated successfully. Feb 9 10:29:32.940000 audit[5650]: CRED_DISP pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.966304 systemd-logind[1338]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:29:32.967237 systemd-logind[1338]: Removed session 12. Feb 9 10:29:32.986155 kernel: audit: type=1106 audit(1707474572.937:1464): pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.986252 kernel: audit: type=1104 audit(1707474572.940:1465): pid=5650 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:32.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.12:22-10.200.12.6:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:35.739000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:35.739000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d12b00 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:35.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:35.767000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:35.767000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d33560 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:35.767000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:36.696000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.696000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.696000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=400a204f90 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:36.696000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4003f2d5a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.696000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:36.710000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.710000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4009d60ed0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:36.712000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.712000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=400a205350 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:36.715000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.715000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4003f2d6a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:36.724000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:36.724000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4009d610b0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:29:36.724000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:38.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.12:22-10.200.12.6:60340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:38.007619 systemd[1]: Started sshd@10-10.200.20.12:22-10.200.12.6:60340.service. Feb 9 10:29:38.012952 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:29:38.013053 kernel: audit: type=1130 audit(1707474578.007:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.12:22-10.200.12.6:60340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:38.422000 audit[5664]: USER_ACCT pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.423662 sshd[5664]: Accepted publickey for core from 10.200.12.6 port 60340 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:38.448371 sshd[5664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:38.448720 kernel: audit: type=1101 audit(1707474578.422:1476): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.448783 kernel: audit: type=1103 audit(1707474578.447:1477): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.447000 audit[5664]: CRED_ACQ pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.474759 systemd[1]: Started session-13.scope. Feb 9 10:29:38.476150 systemd-logind[1338]: New session 13 of user core. Feb 9 10:29:38.486147 kernel: audit: type=1006 audit(1707474578.447:1478): pid=5664 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 10:29:38.447000 audit[5664]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4a090d0 a2=3 a3=1 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:38.509700 kernel: audit: type=1300 audit(1707474578.447:1478): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4a090d0 a2=3 a3=1 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:38.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:38.518090 kernel: audit: type=1327 audit(1707474578.447:1478): proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:38.518369 kernel: audit: type=1105 audit(1707474578.479:1479): pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.479000 audit[5664]: USER_START pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.481000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.566349 kernel: audit: type=1103 audit(1707474578.481:1480): pid=5666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.823875 sshd[5664]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:38.824000 audit[5664]: USER_END pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.831424 systemd[1]: sshd@10-10.200.20.12:22-10.200.12.6:60340.service: Deactivated successfully. Feb 9 10:29:38.832221 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:29:38.829000 audit[5664]: CRED_DISP pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.851795 systemd-logind[1338]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:29:38.852725 systemd-logind[1338]: Removed session 13. Feb 9 10:29:38.872628 kernel: audit: type=1106 audit(1707474578.824:1481): pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.872755 kernel: audit: type=1104 audit(1707474578.829:1482): pid=5664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:38.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.12:22-10.200.12.6:60340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:39.463155 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.trtjdj.mount: Deactivated successfully. Feb 9 10:29:41.392000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:41.392000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:41.392000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000f73b40 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:41.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:41.392000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000da7320 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:41.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:41.393000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:41.393000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000da7800 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:41.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:41.407000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:41.407000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000da7a40 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:29:41.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:43.891968 systemd[1]: Started sshd@11-10.200.20.12:22-10.200.12.6:60354.service. Feb 9 10:29:43.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.12:22-10.200.12.6:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:43.904645 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:29:43.904769 kernel: audit: type=1130 audit(1707474583.890:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.12:22-10.200.12.6:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:44.320000 audit[5701]: USER_ACCT pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.322559 sshd[5701]: Accepted publickey for core from 10.200.12.6 port 60354 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:44.324651 sshd[5701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:44.329359 systemd[1]: Started session-14.scope. Feb 9 10:29:44.330581 systemd-logind[1338]: New session 14 of user core. Feb 9 10:29:44.322000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.367715 kernel: audit: type=1101 audit(1707474584.320:1489): pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.367800 kernel: audit: type=1103 audit(1707474584.322:1490): pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.367828 kernel: audit: type=1006 audit(1707474584.322:1491): pid=5701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:29:44.322000 audit[5701]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc64a1900 a2=3 a3=1 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:44.404704 kernel: audit: type=1300 audit(1707474584.322:1491): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc64a1900 a2=3 a3=1 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:44.322000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:44.413785 kernel: audit: type=1327 audit(1707474584.322:1491): proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:44.333000 audit[5701]: USER_START pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.439568 kernel: audit: type=1105 audit(1707474584.333:1492): pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.335000 audit[5723]: CRED_ACQ pid=5723 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.461180 kernel: audit: type=1103 audit(1707474584.335:1493): pid=5723 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.701913 sshd[5701]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:44.701000 audit[5701]: USER_END pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.701000 audit[5701]: CRED_DISP pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.728949 systemd[1]: sshd@11-10.200.20.12:22-10.200.12.6:60354.service: Deactivated successfully. Feb 9 10:29:44.729767 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:29:44.749551 kernel: audit: type=1106 audit(1707474584.701:1494): pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.749649 kernel: audit: type=1104 audit(1707474584.701:1495): pid=5701 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:44.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.12:22-10.200.12.6:60354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:44.750467 systemd-logind[1338]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:29:44.753830 systemd-logind[1338]: Removed session 14. Feb 9 10:29:44.771780 systemd[1]: Started sshd@12-10.200.20.12:22-10.200.12.6:60368.service. Feb 9 10:29:44.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.12:22-10.200.12.6:60368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:45.188248 sshd[5734]: Accepted publickey for core from 10.200.12.6 port 60368 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:45.186000 audit[5734]: USER_ACCT pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:45.187000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:45.187000 audit[5734]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7af14e0 a2=3 a3=1 items=0 ppid=1 pid=5734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:45.187000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:45.189931 sshd[5734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:45.194174 systemd[1]: Started session-15.scope. Feb 9 10:29:45.194586 systemd-logind[1338]: New session 15 of user core. Feb 9 10:29:45.197000 audit[5734]: USER_START pid=5734 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:45.198000 audit[5736]: CRED_ACQ pid=5736 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:45.337011 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.aaxTNJ.mount: Deactivated successfully. Feb 9 10:29:46.331103 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.60w9sJ.mount: Deactivated successfully. Feb 9 10:29:46.750445 sshd[5734]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:46.749000 audit[5734]: USER_END pid=5734 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:46.750000 audit[5734]: CRED_DISP pid=5734 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:46.753205 systemd[1]: sshd@12-10.200.20.12:22-10.200.12.6:60368.service: Deactivated successfully. Feb 9 10:29:46.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.12:22-10.200.12.6:60368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:46.753985 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:29:46.754641 systemd-logind[1338]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:29:46.755483 systemd-logind[1338]: Removed session 15. Feb 9 10:29:46.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.12:22-10.200.12.6:60380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:46.828896 systemd[1]: Started sshd@13-10.200.20.12:22-10.200.12.6:60380.service. Feb 9 10:29:47.241936 sshd[5786]: Accepted publickey for core from 10.200.12.6 port 60380 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:47.240000 audit[5786]: USER_ACCT pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.243619 sshd[5786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:47.241000 audit[5786]: CRED_ACQ pid=5786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.241000 audit[5786]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb9636e0 a2=3 a3=1 items=0 ppid=1 pid=5786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:47.247914 systemd-logind[1338]: New session 16 of user core. Feb 9 10:29:47.248330 systemd[1]: Started session-16.scope. Feb 9 10:29:47.250000 audit[5786]: USER_START pid=5786 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.252000 audit[5789]: CRED_ACQ pid=5789 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.618056 sshd[5786]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:47.617000 audit[5786]: USER_END pid=5786 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.618000 audit[5786]: CRED_DISP pid=5786 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:47.621058 systemd-logind[1338]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:29:47.621315 systemd[1]: sshd@13-10.200.20.12:22-10.200.12.6:60380.service: Deactivated successfully. Feb 9 10:29:47.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.12:22-10.200.12.6:60380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:47.622111 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:29:47.622951 systemd-logind[1338]: Removed session 16. Feb 9 10:29:50.498000 audit[5126]: AVC avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:29:50.503823 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:29:50.503901 kernel: audit: type=1400 audit(1707474590.498:1515): avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:29:50.498000 audit[5126]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40018ffa00 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:29:50.554067 kernel: audit: type=1300 audit(1707474590.498:1515): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40018ffa00 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:29:50.498000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:29:50.578106 kernel: audit: type=1327 audit(1707474590.498:1515): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:29:50.885000 audit[5164]: AVC avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:29:50.885000 audit[5164]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40018d49a0 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:29:50.936709 kernel: audit: type=1400 audit(1707474590.885:1516): avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:29:50.936839 kernel: audit: type=1300 audit(1707474590.885:1516): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40018d49a0 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:29:50.936878 kernel: audit: type=1327 audit(1707474590.885:1516): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:29:50.885000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:29:52.692280 systemd[1]: Started sshd@14-10.200.20.12:22-10.200.12.6:50556.service. Feb 9 10:29:52.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.12:22-10.200.12.6:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:52.714721 kernel: audit: type=1130 audit(1707474592.691:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.12:22-10.200.12.6:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:53.107172 sshd[5817]: Accepted publickey for core from 10.200.12.6 port 50556 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:53.106000 audit[5817]: USER_ACCT pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.132339 sshd[5817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:53.131000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.158798 kernel: audit: type=1101 audit(1707474593.106:1518): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.158950 kernel: audit: type=1103 audit(1707474593.131:1519): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.174474 kernel: audit: type=1006 audit(1707474593.131:1520): pid=5817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 10:29:53.131000 audit[5817]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde3b2270 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:53.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:53.178150 systemd-logind[1338]: New session 17 of user core. Feb 9 10:29:53.178625 systemd[1]: Started session-17.scope. Feb 9 10:29:53.183000 audit[5817]: USER_START pid=5817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.184000 audit[5819]: CRED_ACQ pid=5819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.508679 sshd[5817]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:53.509000 audit[5817]: USER_END pid=5817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.509000 audit[5817]: CRED_DISP pid=5817 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:53.511724 systemd-logind[1338]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:29:53.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.12:22-10.200.12.6:50556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:53.512195 systemd[1]: sshd@14-10.200.20.12:22-10.200.12.6:50556.service: Deactivated successfully. Feb 9 10:29:53.512996 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:29:53.514060 systemd-logind[1338]: Removed session 17. Feb 9 10:29:53.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.12:22-10.200.12.6:50560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:53.584620 systemd[1]: Started sshd@15-10.200.20.12:22-10.200.12.6:50560.service. Feb 9 10:29:54.028000 audit[5829]: USER_ACCT pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.029632 sshd[5829]: Accepted publickey for core from 10.200.12.6 port 50560 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:54.030000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.030000 audit[5829]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe69a180 a2=3 a3=1 items=0 ppid=1 pid=5829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:54.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:54.031125 sshd[5829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:54.038500 systemd-logind[1338]: New session 18 of user core. Feb 9 10:29:54.039259 systemd[1]: Started session-18.scope. Feb 9 10:29:54.042000 audit[5829]: USER_START pid=5829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.044000 audit[5831]: CRED_ACQ pid=5831 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.653967 sshd[5829]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:54.654000 audit[5829]: USER_END pid=5829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.654000 audit[5829]: CRED_DISP pid=5829 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:54.657090 systemd-logind[1338]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:29:54.657261 systemd[1]: sshd@15-10.200.20.12:22-10.200.12.6:50560.service: Deactivated successfully. Feb 9 10:29:54.658046 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:29:54.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.12:22-10.200.12.6:50560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:54.658758 systemd-logind[1338]: Removed session 18. Feb 9 10:29:54.723496 systemd[1]: Started sshd@16-10.200.20.12:22-10.200.12.6:50570.service. Feb 9 10:29:54.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.12:22-10.200.12.6:50570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:55.134000 audit[5841]: USER_ACCT pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:55.135625 sshd[5841]: Accepted publickey for core from 10.200.12.6 port 50570 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:55.135000 audit[5841]: CRED_ACQ pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:55.136000 audit[5841]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde057cc0 a2=3 a3=1 items=0 ppid=1 pid=5841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:55.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:55.137340 sshd[5841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:55.141257 systemd-logind[1338]: New session 19 of user core. Feb 9 10:29:55.141742 systemd[1]: Started session-19.scope. Feb 9 10:29:55.145000 audit[5841]: USER_START pid=5841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:55.147000 audit[5843]: CRED_ACQ pid=5843 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.317000 audit[5877]: NETFILTER_CFG table=filter:140 family=2 entries=18 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.323760 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:29:56.323872 kernel: audit: type=1325 audit(1707474596.317:1541): table=filter:140 family=2 entries=18 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.325534 sshd[5841]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:56.337959 systemd[1]: sshd@16-10.200.20.12:22-10.200.12.6:50570.service: Deactivated successfully. Feb 9 10:29:56.338781 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:29:56.317000 audit[5877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffd437a7d0 a2=0 a3=ffffa54bf6c0 items=0 ppid=2634 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.339416 systemd-logind[1338]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:29:56.366326 kernel: audit: type=1300 audit(1707474596.317:1541): arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffd437a7d0 a2=0 a3=ffffa54bf6c0 items=0 ppid=2634 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.367347 systemd-logind[1338]: Removed session 19. Feb 9 10:29:56.380185 kernel: audit: type=1327 audit(1707474596.317:1541): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.380704 kernel: audit: type=1106 audit(1707474596.325:1542): pid=5841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.325000 audit[5841]: USER_END pid=5841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.326000 audit[5841]: CRED_DISP pid=5841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.428854 kernel: audit: type=1104 audit(1707474596.326:1543): pid=5841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.12:22-10.200.12.6:50570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:56.435307 systemd[1]: Started sshd@17-10.200.20.12:22-10.200.12.6:50574.service. Feb 9 10:29:56.462203 kernel: audit: type=1131 audit(1707474596.337:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.12:22-10.200.12.6:50570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:56.462303 kernel: audit: type=1325 audit(1707474596.319:1545): table=nat:141 family=2 entries=94 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.319000 audit[5877]: NETFILTER_CFG table=nat:141 family=2 entries=94 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.319000 audit[5877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffd437a7d0 a2=0 a3=ffffa54bf6c0 items=0 ppid=2634 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.500082 kernel: audit: type=1300 audit(1707474596.319:1545): arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffd437a7d0 a2=0 a3=ffffa54bf6c0 items=0 ppid=2634 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.513568 kernel: audit: type=1327 audit(1707474596.319:1545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.12:22-10.200.12.6:50574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:56.536488 kernel: audit: type=1130 audit(1707474596.434:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.12:22-10.200.12.6:50574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:56.560000 audit[5907]: NETFILTER_CFG table=filter:142 family=2 entries=30 op=nft_register_rule pid=5907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.560000 audit[5907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffcf8a65a0 a2=0 a3=ffffb87ed6c0 items=0 ppid=2634 pid=5907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.563000 audit[5907]: NETFILTER_CFG table=nat:143 family=2 entries=94 op=nft_register_rule pid=5907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.563000 audit[5907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffcf8a65a0 a2=0 a3=ffffb87ed6c0 items=0 ppid=2634 pid=5907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.906000 audit[5884]: USER_ACCT pid=5884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.906924 sshd[5884]: Accepted publickey for core from 10.200.12.6 port 50574 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:56.907000 audit[5884]: CRED_ACQ pid=5884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.907000 audit[5884]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffceb9ac20 a2=3 a3=1 items=0 ppid=1 pid=5884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.907000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:56.908194 sshd[5884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:56.913787 systemd[1]: Started session-20.scope. Feb 9 10:29:56.914477 systemd-logind[1338]: New session 20 of user core. Feb 9 10:29:56.917000 audit[5884]: USER_START pid=5884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:56.919000 audit[5909]: CRED_ACQ pid=5909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.424774 sshd[5884]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:57.425000 audit[5884]: USER_END pid=5884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.425000 audit[5884]: CRED_DISP pid=5884 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.427672 systemd-logind[1338]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:29:57.428456 systemd[1]: sshd@17-10.200.20.12:22-10.200.12.6:50574.service: Deactivated successfully. Feb 9 10:29:57.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.12:22-10.200.12.6:50574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:57.430360 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:29:57.430871 systemd-logind[1338]: Removed session 20. Feb 9 10:29:57.492962 systemd[1]: Started sshd@18-10.200.20.12:22-10.200.12.6:50182.service. Feb 9 10:29:57.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.12:22-10.200.12.6:50182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:57.903000 audit[5918]: USER_ACCT pid=5918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.904837 sshd[5918]: Accepted publickey for core from 10.200.12.6 port 50182 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:57.905000 audit[5918]: CRED_ACQ pid=5918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.905000 audit[5918]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb30e0c0 a2=3 a3=1 items=0 ppid=1 pid=5918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:57.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:57.906417 sshd[5918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:57.911332 systemd[1]: Started session-21.scope. Feb 9 10:29:57.912181 systemd-logind[1338]: New session 21 of user core. Feb 9 10:29:57.915000 audit[5918]: USER_START pid=5918 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:57.916000 audit[5920]: CRED_ACQ pid=5920 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:58.264603 sshd[5918]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:58.265000 audit[5918]: USER_END pid=5918 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:58.265000 audit[5918]: CRED_DISP pid=5918 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:58.267727 systemd-logind[1338]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:29:58.268003 systemd[1]: sshd@18-10.200.20.12:22-10.200.12.6:50182.service: Deactivated successfully. Feb 9 10:29:58.268778 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:29:58.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.12:22-10.200.12.6:50182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:58.269542 systemd-logind[1338]: Removed session 21. Feb 9 10:30:03.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.12:22-10.200.12.6:50196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:03.366117 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 9 10:30:03.366201 kernel: audit: type=1130 audit(1707474603.336:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.12:22-10.200.12.6:50196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:03.337155 systemd[1]: Started sshd@19-10.200.20.12:22-10.200.12.6:50196.service. Feb 9 10:30:03.749000 audit[5930]: USER_ACCT pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.750127 sshd[5930]: Accepted publickey for core from 10.200.12.6 port 50196 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:03.774730 kernel: audit: type=1101 audit(1707474603.749:1567): pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.774844 kernel: audit: type=1103 audit(1707474603.773:1568): pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.773000 audit[5930]: CRED_ACQ pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.775242 sshd[5930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:03.811612 kernel: audit: type=1006 audit(1707474603.773:1569): pid=5930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 10:30:03.773000 audit[5930]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcac54050 a2=3 a3=1 items=0 ppid=1 pid=5930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.815356 systemd[1]: Started session-22.scope. Feb 9 10:30:03.816207 systemd-logind[1338]: New session 22 of user core. Feb 9 10:30:03.835473 kernel: audit: type=1300 audit(1707474603.773:1569): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcac54050 a2=3 a3=1 items=0 ppid=1 pid=5930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.773000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:03.845977 kernel: audit: type=1327 audit(1707474603.773:1569): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:03.827000 audit[5930]: USER_START pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.871795 kernel: audit: type=1105 audit(1707474603.827:1570): pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.836000 audit[5934]: CRED_ACQ pid=5934 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:03.893871 kernel: audit: type=1103 audit(1707474603.836:1571): pid=5934 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:04.132160 sshd[5930]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:04.132000 audit[5930]: USER_END pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:04.135780 systemd-logind[1338]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:30:04.137149 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:30:04.138679 systemd-logind[1338]: Removed session 22. Feb 9 10:30:04.139310 systemd[1]: sshd@19-10.200.20.12:22-10.200.12.6:50196.service: Deactivated successfully. Feb 9 10:30:04.132000 audit[5930]: CRED_DISP pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:04.180570 kernel: audit: type=1106 audit(1707474604.132:1572): pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:04.180771 kernel: audit: type=1104 audit(1707474604.132:1573): pid=5930 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:04.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.12:22-10.200.12.6:50196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:04.516000 audit[5969]: NETFILTER_CFG table=filter:144 family=2 entries=18 op=nft_register_rule pid=5969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:04.516000 audit[5969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc620ed40 a2=0 a3=ffff9d8a96c0 items=0 ppid=2634 pid=5969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:04.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:04.520000 audit[5969]: NETFILTER_CFG table=nat:145 family=2 entries=178 op=nft_register_chain pid=5969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:04.520000 audit[5969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffc620ed40 a2=0 a3=ffff9d8a96c0 items=0 ppid=2634 pid=5969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:04.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:09.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.12:22-10.200.12.6:33704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:09.203898 systemd[1]: Started sshd@20-10.200.20.12:22-10.200.12.6:33704.service. Feb 9 10:30:09.208996 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 10:30:09.209094 kernel: audit: type=1130 audit(1707474609.202:1577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.12:22-10.200.12.6:33704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:09.461515 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.D7SEwr.mount: Deactivated successfully. Feb 9 10:30:09.613000 audit[5973]: USER_ACCT pid=5973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.616844 sshd[5973]: Accepted publickey for core from 10.200.12.6 port 33704 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:09.617603 sshd[5973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:09.615000 audit[5973]: CRED_ACQ pid=5973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.660336 kernel: audit: type=1101 audit(1707474609.613:1578): pid=5973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.660456 kernel: audit: type=1103 audit(1707474609.615:1579): pid=5973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.660494 kernel: audit: type=1006 audit(1707474609.615:1580): pid=5973 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 10:30:09.615000 audit[5973]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff22e4f50 a2=3 a3=1 items=0 ppid=1 pid=5973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:09.697316 kernel: audit: type=1300 audit(1707474609.615:1580): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff22e4f50 a2=3 a3=1 items=0 ppid=1 pid=5973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:09.615000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:09.705750 kernel: audit: type=1327 audit(1707474609.615:1580): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:09.709019 systemd[1]: Started session-23.scope. Feb 9 10:30:09.709146 systemd-logind[1338]: New session 23 of user core. Feb 9 10:30:09.712000 audit[5973]: USER_START pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.713000 audit[5996]: CRED_ACQ pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.761933 kernel: audit: type=1105 audit(1707474609.712:1581): pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:09.762050 kernel: audit: type=1103 audit(1707474609.713:1582): pid=5996 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:10.036893 sshd[5973]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:10.036000 audit[5973]: USER_END pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:10.036000 audit[5973]: CRED_DISP pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:10.066284 systemd[1]: sshd@20-10.200.20.12:22-10.200.12.6:33704.service: Deactivated successfully. Feb 9 10:30:10.067133 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:30:10.088559 kernel: audit: type=1106 audit(1707474610.036:1583): pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:10.088677 kernel: audit: type=1104 audit(1707474610.036:1584): pid=5973 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:10.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.12:22-10.200.12.6:33704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:10.089351 systemd-logind[1338]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:30:10.090202 systemd-logind[1338]: Removed session 23. Feb 9 10:30:14.238379 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.PJHsgu.mount: Deactivated successfully. Feb 9 10:30:15.115444 systemd[1]: Started sshd@21-10.200.20.12:22-10.200.12.6:33716.service. Feb 9 10:30:15.146883 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:30:15.147015 kernel: audit: type=1130 audit(1707474615.114:1586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.12:22-10.200.12.6:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:15.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.12:22-10.200.12.6:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:15.333280 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.4xF7GW.mount: Deactivated successfully. Feb 9 10:30:15.564000 audit[6032]: USER_ACCT pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.566419 sshd[6032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:15.567196 sshd[6032]: Accepted publickey for core from 10.200.12.6 port 33716 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:15.565000 audit[6032]: CRED_ACQ pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.610652 kernel: audit: type=1101 audit(1707474615.564:1587): pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.610777 kernel: audit: type=1103 audit(1707474615.565:1588): pid=6032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.625822 kernel: audit: type=1006 audit(1707474615.565:1589): pid=6032 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 10:30:15.631702 systemd[1]: Started session-24.scope. Feb 9 10:30:15.632019 systemd-logind[1338]: New session 24 of user core. Feb 9 10:30:15.565000 audit[6032]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc12ded00 a2=3 a3=1 items=0 ppid=1 pid=6032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:15.657549 kernel: audit: type=1300 audit(1707474615.565:1589): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc12ded00 a2=3 a3=1 items=0 ppid=1 pid=6032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:15.565000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:15.665483 kernel: audit: type=1327 audit(1707474615.565:1589): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:15.667000 audit[6032]: USER_START pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.693000 audit[6072]: CRED_ACQ pid=6072 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.715352 kernel: audit: type=1105 audit(1707474615.667:1590): pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:15.715446 kernel: audit: type=1103 audit(1707474615.693:1591): pid=6072 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:16.006434 sshd[6032]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:16.006000 audit[6032]: USER_END pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:16.010509 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:30:16.011556 systemd[1]: sshd@21-10.200.20.12:22-10.200.12.6:33716.service: Deactivated successfully. Feb 9 10:30:16.008000 audit[6032]: CRED_DISP pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:16.033857 systemd-logind[1338]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:30:16.034771 systemd-logind[1338]: Removed session 24. Feb 9 10:30:16.054496 kernel: audit: type=1106 audit(1707474616.006:1592): pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:16.054636 kernel: audit: type=1104 audit(1707474616.008:1593): pid=6032 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:16.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.12:22-10.200.12.6:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:21.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.12:22-10.200.12.6:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:21.083297 systemd[1]: Started sshd@22-10.200.20.12:22-10.200.12.6:51304.service. Feb 9 10:30:21.088419 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:30:21.088525 kernel: audit: type=1130 audit(1707474621.082:1595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.12:22-10.200.12.6:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:21.496000 audit[6083]: USER_ACCT pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.497399 sshd[6083]: Accepted publickey for core from 10.200.12.6 port 51304 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:21.520000 audit[6083]: CRED_ACQ pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.522084 sshd[6083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:21.543518 kernel: audit: type=1101 audit(1707474621.496:1596): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.543618 kernel: audit: type=1103 audit(1707474621.520:1597): pid=6083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.557524 kernel: audit: type=1006 audit(1707474621.521:1598): pid=6083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 10:30:21.521000 audit[6083]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde7b90e0 a2=3 a3=1 items=0 ppid=1 pid=6083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:21.581120 kernel: audit: type=1300 audit(1707474621.521:1598): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde7b90e0 a2=3 a3=1 items=0 ppid=1 pid=6083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:21.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:21.589450 kernel: audit: type=1327 audit(1707474621.521:1598): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:21.592502 systemd[1]: Started session-25.scope. Feb 9 10:30:21.592656 systemd-logind[1338]: New session 25 of user core. Feb 9 10:30:21.596000 audit[6083]: USER_START pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.622000 audit[6085]: CRED_ACQ pid=6085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.643964 kernel: audit: type=1105 audit(1707474621.596:1599): pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.644066 kernel: audit: type=1103 audit(1707474621.622:1600): pid=6085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.927908 sshd[6083]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:21.928000 audit[6083]: USER_END pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.929000 audit[6083]: CRED_DISP pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.954809 systemd[1]: sshd@22-10.200.20.12:22-10.200.12.6:51304.service: Deactivated successfully. Feb 9 10:30:21.955623 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:30:21.975279 kernel: audit: type=1106 audit(1707474621.928:1601): pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.975373 kernel: audit: type=1104 audit(1707474621.929:1602): pid=6083 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:21.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.12:22-10.200.12.6:51304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:21.975851 systemd-logind[1338]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:30:21.976652 systemd-logind[1338]: Removed session 25. Feb 9 10:30:27.019972 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:30:27.020092 kernel: audit: type=1130 audit(1707474626.993:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.12:22-10.200.12.6:33492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:26.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.12:22-10.200.12.6:33492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:26.994462 systemd[1]: Started sshd@23-10.200.20.12:22-10.200.12.6:33492.service. Feb 9 10:30:27.405000 audit[6099]: USER_ACCT pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.406896 sshd[6099]: Accepted publickey for core from 10.200.12.6 port 33492 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:27.408604 sshd[6099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:27.407000 audit[6099]: CRED_ACQ pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.451462 kernel: audit: type=1101 audit(1707474627.405:1605): pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.451564 kernel: audit: type=1103 audit(1707474627.407:1606): pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.451774 kernel: audit: type=1006 audit(1707474627.407:1607): pid=6099 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 10:30:27.407000 audit[6099]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe367ff30 a2=3 a3=1 items=0 ppid=1 pid=6099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:27.488330 kernel: audit: type=1300 audit(1707474627.407:1607): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe367ff30 a2=3 a3=1 items=0 ppid=1 pid=6099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:27.407000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:27.499737 kernel: audit: type=1327 audit(1707474627.407:1607): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:27.503734 systemd-logind[1338]: New session 26 of user core. Feb 9 10:30:27.504400 systemd[1]: Started session-26.scope. Feb 9 10:30:27.508000 audit[6099]: USER_START pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.509000 audit[6101]: CRED_ACQ pid=6101 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.556696 kernel: audit: type=1105 audit(1707474627.508:1608): pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.556827 kernel: audit: type=1103 audit(1707474627.509:1609): pid=6101 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.811908 sshd[6099]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:27.812000 audit[6099]: USER_END pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.814745 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 10:30:27.815635 systemd[1]: sshd@23-10.200.20.12:22-10.200.12.6:33492.service: Deactivated successfully. Feb 9 10:30:27.812000 audit[6099]: CRED_DISP pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.844838 systemd-logind[1338]: Session 26 logged out. Waiting for processes to exit. Feb 9 10:30:27.845550 systemd-logind[1338]: Removed session 26. Feb 9 10:30:27.861076 kernel: audit: type=1106 audit(1707474627.812:1610): pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.861182 kernel: audit: type=1104 audit(1707474627.812:1611): pid=6099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:27.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.12:22-10.200.12.6:33492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:32.881195 systemd[1]: Started sshd@24-10.200.20.12:22-10.200.12.6:33504.service. Feb 9 10:30:32.908392 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:30:32.908510 kernel: audit: type=1130 audit(1707474632.879:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.12:22-10.200.12.6:33504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:32.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.12:22-10.200.12.6:33504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:33.290000 audit[6116]: USER_ACCT pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.292628 sshd[6116]: Accepted publickey for core from 10.200.12.6 port 33504 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:33.294429 sshd[6116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:33.292000 audit[6116]: CRED_ACQ pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.316745 kernel: audit: type=1101 audit(1707474633.290:1614): pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.353675 kernel: audit: type=1103 audit(1707474633.292:1615): pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.353804 kernel: audit: type=1006 audit(1707474633.292:1616): pid=6116 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 10:30:33.292000 audit[6116]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2fa6490 a2=3 a3=1 items=0 ppid=1 pid=6116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.377785 kernel: audit: type=1300 audit(1707474633.292:1616): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2fa6490 a2=3 a3=1 items=0 ppid=1 pid=6116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:33.385816 kernel: audit: type=1327 audit(1707474633.292:1616): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:33.387752 systemd-logind[1338]: New session 27 of user core. Feb 9 10:30:33.388232 systemd[1]: Started session-27.scope. Feb 9 10:30:33.391000 audit[6116]: USER_START pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.419104 kernel: audit: type=1105 audit(1707474633.391:1617): pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.419194 kernel: audit: type=1103 audit(1707474633.417:1618): pid=6118 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.417000 audit[6118]: CRED_ACQ pid=6118 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.712869 sshd[6116]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:33.712000 audit[6116]: USER_END pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.739807 systemd[1]: sshd@24-10.200.20.12:22-10.200.12.6:33504.service: Deactivated successfully. Feb 9 10:30:33.740582 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 10:30:33.713000 audit[6116]: CRED_DISP pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.741916 systemd-logind[1338]: Session 27 logged out. Waiting for processes to exit. Feb 9 10:30:33.763558 kernel: audit: type=1106 audit(1707474633.712:1619): pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.763670 kernel: audit: type=1104 audit(1707474633.713:1620): pid=6116 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:33.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.12:22-10.200.12.6:33504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:33.764221 systemd-logind[1338]: Removed session 27. Feb 9 10:30:35.740000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:35.740000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021d3c80 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:35.740000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:35.767000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:35.767000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400247be30 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:35.767000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:36.695000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.695000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400bea5040 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.695000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:36.695000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.695000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401c8906f0 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.695000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:36.710000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.710000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401c9f8e10 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:36.712000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.712000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401c9f8e40 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:36.714000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.714000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400bbb6520 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:36.724000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:36.724000 audit[2367]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401c9f8e70 a2=fc6 a3=0 items=0 ppid=2223 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c230 key=(null) Feb 9 10:30:36.724000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:38.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.12:22-10.200.12.6:39042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:38.785459 systemd[1]: Started sshd@25-10.200.20.12:22-10.200.12.6:39042.service. Feb 9 10:30:38.790751 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:30:38.790854 kernel: audit: type=1130 audit(1707474638.784:1630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.12:22-10.200.12.6:39042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:39.196000 audit[6129]: USER_ACCT pid=6129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.197660 sshd[6129]: Accepted publickey for core from 10.200.12.6 port 39042 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:30:39.221726 kernel: audit: type=1101 audit(1707474639.196:1631): pid=6129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.221812 kernel: audit: type=1103 audit(1707474639.220:1632): pid=6129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.220000 audit[6129]: CRED_ACQ pid=6129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.222010 sshd[6129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:30:39.256950 kernel: audit: type=1006 audit(1707474639.220:1633): pid=6129 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 10:30:39.220000 audit[6129]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe82d8b90 a2=3 a3=1 items=0 ppid=1 pid=6129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:39.280466 kernel: audit: type=1300 audit(1707474639.220:1633): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe82d8b90 a2=3 a3=1 items=0 ppid=1 pid=6129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:39.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:39.289003 kernel: audit: type=1327 audit(1707474639.220:1633): proctitle=737368643A20636F7265205B707269765D Feb 9 10:30:39.290940 systemd-logind[1338]: New session 28 of user core. Feb 9 10:30:39.291395 systemd[1]: Started session-28.scope. Feb 9 10:30:39.295000 audit[6129]: USER_START pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.321000 audit[6131]: CRED_ACQ pid=6131 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.343677 kernel: audit: type=1105 audit(1707474639.295:1634): pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.343862 kernel: audit: type=1103 audit(1707474639.321:1635): pid=6131 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.613908 sshd[6129]: pam_unix(sshd:session): session closed for user core Feb 9 10:30:39.614000 audit[6129]: USER_END pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.615000 audit[6129]: CRED_DISP pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.640391 systemd[1]: sshd@25-10.200.20.12:22-10.200.12.6:39042.service: Deactivated successfully. Feb 9 10:30:39.641209 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 10:30:39.642441 systemd-logind[1338]: Session 28 logged out. Waiting for processes to exit. Feb 9 10:30:39.643306 systemd-logind[1338]: Removed session 28. Feb 9 10:30:39.660657 kernel: audit: type=1106 audit(1707474639.614:1636): pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.660762 kernel: audit: type=1104 audit(1707474639.615:1637): pid=6129 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:30:39.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.12:22-10.200.12.6:39042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:30:41.394000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:41.394000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:41.394000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400167d6e0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:41.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:41.394000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002433080 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:41.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:41.394000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:41.394000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167d9a0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:41.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:41.408000 audit[2308]: AVC avc: denied { watch } for pid=2308 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:41.408000 audit[2308]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400167dae0 a2=fc6 a3=0 items=0 ppid=2165 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:41.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:44.236169 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.JxYF4k.mount: Deactivated successfully. Feb 9 10:30:45.339754 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.z8IazV.mount: Deactivated successfully. Feb 9 10:30:45.376141 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.3DCypb.mount: Deactivated successfully. Feb 9 10:30:48.010773 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.uUczCQ.mount: Deactivated successfully. Feb 9 10:30:50.498000 audit[5126]: AVC avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:30:50.505011 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:30:50.505085 kernel: audit: type=1400 audit(1707474650.498:1643): avc: denied { watch } for pid=5126 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.4281154668/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c665,c675 tclass=file permissive=0 Feb 9 10:30:50.498000 audit[5126]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001c33a20 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:30:50.563998 kernel: audit: type=1300 audit(1707474650.498:1643): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001c33a20 a2=fc6 a3=0 items=0 ppid=5005 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c665,c675 key=(null) Feb 9 10:30:50.498000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:30:50.590720 kernel: audit: type=1327 audit(1707474650.498:1643): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:30:50.887000 audit[5164]: AVC avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:30:50.887000 audit[5164]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000619500 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:30:50.944747 kernel: audit: type=1400 audit(1707474650.887:1644): avc: denied { watch } for pid=5164 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_27_45.404641696/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c620,c791 tclass=file permissive=0 Feb 9 10:30:50.944891 kernel: audit: type=1300 audit(1707474650.887:1644): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000619500 a2=fc6 a3=0 items=0 ppid=5020 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c620,c791 key=(null) Feb 9 10:30:50.887000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:30:50.971886 kernel: audit: type=1327 audit(1707474650.887:1644): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:30:54.237463 kubelet[2478]: E0209 10:30:54.237415 2478 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:30:54.681640 kubelet[2478]: E0209 10:30:54.681548 2478 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.12:56116->10.200.20.10:2379: read: connection timed out Feb 9 10:30:54.951628 systemd[1]: cri-containerd-42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6.scope: Deactivated successfully. Feb 9 10:30:54.951960 systemd[1]: cri-containerd-42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6.scope: Consumed 3.217s CPU time. Feb 9 10:30:54.955000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:30:54.955000 audit: BPF prog-id=91 op=UNLOAD Feb 9 10:30:54.973041 kernel: audit: type=1334 audit(1707474654.955:1645): prog-id=77 op=UNLOAD Feb 9 10:30:54.973128 kernel: audit: type=1334 audit(1707474654.955:1646): prog-id=91 op=UNLOAD Feb 9 10:30:54.978396 systemd[1]: cri-containerd-300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172.scope: Deactivated successfully. Feb 9 10:30:54.978714 systemd[1]: cri-containerd-300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172.scope: Consumed 5.430s CPU time. Feb 9 10:30:54.977000 audit: BPF prog-id=118 op=UNLOAD Feb 9 10:30:54.989038 kernel: audit: type=1334 audit(1707474654.977:1647): prog-id=118 op=UNLOAD Feb 9 10:30:54.988000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:30:55.000917 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6-rootfs.mount: Deactivated successfully. Feb 9 10:30:55.001843 env[1350]: time="2024-02-09T10:30:55.001792427Z" level=info msg="shim disconnected" id=42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6 Feb 9 10:30:55.001843 env[1350]: time="2024-02-09T10:30:55.001841825Z" level=warning msg="cleaning up after shim disconnected" id=42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6 namespace=k8s.io Feb 9 10:30:55.002155 env[1350]: time="2024-02-09T10:30:55.001852105Z" level=info msg="cleaning up dead shim" Feb 9 10:30:55.003771 kernel: audit: type=1334 audit(1707474654.988:1648): prog-id=121 op=UNLOAD Feb 9 10:30:55.010541 env[1350]: time="2024-02-09T10:30:55.010493499Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:30:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6268 runtime=io.containerd.runc.v2\n" Feb 9 10:30:55.019400 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172-rootfs.mount: Deactivated successfully. Feb 9 10:30:55.020593 env[1350]: time="2024-02-09T10:30:55.020551559Z" level=info msg="shim disconnected" id=300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172 Feb 9 10:30:55.020770 env[1350]: time="2024-02-09T10:30:55.020739832Z" level=warning msg="cleaning up after shim disconnected" id=300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172 namespace=k8s.io Feb 9 10:30:55.020770 env[1350]: time="2024-02-09T10:30:55.020765151Z" level=info msg="cleaning up dead shim" Feb 9 10:30:55.028465 env[1350]: time="2024-02-09T10:30:55.028420222Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:30:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6292 runtime=io.containerd.runc.v2\n" Feb 9 10:30:55.551705 kubelet[2478]: I0209 10:30:55.551658 2478 scope.go:115] "RemoveContainer" containerID="42ff498153be96194c8b034793b8f5a5ccc62ba4e7f4e8acd3c68376575217c6" Feb 9 10:30:55.553894 env[1350]: time="2024-02-09T10:30:55.553842584Z" level=info msg="CreateContainer within sandbox \"48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 10:30:55.554024 kubelet[2478]: I0209 10:30:55.553941 2478 scope.go:115] "RemoveContainer" containerID="300be3ce0122910d6f7352a56ac785048dd2c02466a4b0b85c0a526473012172" Feb 9 10:30:55.555588 env[1350]: time="2024-02-09T10:30:55.555552000Z" level=info msg="CreateContainer within sandbox \"618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 10:30:55.586270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount428959224.mount: Deactivated successfully. Feb 9 10:30:55.603963 env[1350]: time="2024-02-09T10:30:55.603908734Z" level=info msg="CreateContainer within sandbox \"48a74e28c69d53d4c2451219dcea4c91006db8a229ed981857566e79643180f8\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"fddb303cf45174a65ee45a8b4d589a20d712b44805aebd8000119fc69d4cac86\"" Feb 9 10:30:55.604570 env[1350]: time="2024-02-09T10:30:55.604540830Z" level=info msg="StartContainer for \"fddb303cf45174a65ee45a8b4d589a20d712b44805aebd8000119fc69d4cac86\"" Feb 9 10:30:55.616292 env[1350]: time="2024-02-09T10:30:55.616255588Z" level=info msg="CreateContainer within sandbox \"618bea8a2eeeff271281c656f8d7a3b24fe5fa2ce92c610ab57dc05ae57a97e3\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"43fbcc8fe3e9f96273a3b2d2c44b8e85c8c51ff27998996a6f807c8b41ae0d9e\"" Feb 9 10:30:55.616950 env[1350]: time="2024-02-09T10:30:55.616927882Z" level=info msg="StartContainer for \"43fbcc8fe3e9f96273a3b2d2c44b8e85c8c51ff27998996a6f807c8b41ae0d9e\"" Feb 9 10:30:55.622830 systemd[1]: Started cri-containerd-fddb303cf45174a65ee45a8b4d589a20d712b44805aebd8000119fc69d4cac86.scope. Feb 9 10:30:55.642820 systemd[1]: Started cri-containerd-43fbcc8fe3e9f96273a3b2d2c44b8e85c8c51ff27998996a6f807c8b41ae0d9e.scope. Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.668706 kernel: audit: type=1400 audit(1707474655.644:1649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.707978 kernel: audit: type=1400 audit(1707474655.644:1650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.708074 kernel: audit: type=1400 audit(1707474655.644:1651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.753957 kernel: audit: type=1400 audit(1707474655.644:1652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.754083 kernel: audit: type=1400 audit(1707474655.644:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.754113 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:30:55.754149 kernel: audit: type=1400 audit(1707474655.644:1654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.780926 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:30:55.781049 kernel: audit: type=1400 audit(1707474655.644:1655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.801747 kernel: audit: backlog limit exceeded Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit: BPF prog-id=196 op=LOAD Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2165 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646233303363663435313734613635656534356138623464353839 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2165 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646233303363663435313734613635656534356138623464353839 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.645000 audit: BPF prog-id=197 op=LOAD Feb 9 10:30:55.645000 audit[6315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2165 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646233303363663435313734613635656534356138623464353839 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit: BPF prog-id=198 op=LOAD Feb 9 10:30:55.666000 audit[6315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2165 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646233303363663435313734613635656534356138623464353839 Feb 9 10:30:55.666000 audit: BPF prog-id=198 op=UNLOAD Feb 9 10:30:55.666000 audit: BPF prog-id=197 op=UNLOAD Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.666000 audit: BPF prog-id=199 op=LOAD Feb 9 10:30:55.666000 audit[6315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2165 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646233303363663435313734613635656534356138623464353839 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.804000 audit: BPF prog-id=200 op=LOAD Feb 9 10:30:55.805000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.805000 audit[6338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2660 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666263633866653365396639363237336133623264326334346238 Feb 9 10:30:55.805000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.805000 audit[6338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2660 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666263633866653365396639363237336133623264326334346238 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit: BPF prog-id=201 op=LOAD Feb 9 10:30:55.806000 audit[6338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2660 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666263633866653365396639363237336133623264326334346238 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit: BPF prog-id=202 op=LOAD Feb 9 10:30:55.806000 audit[6338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2660 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666263633866653365396639363237336133623264326334346238 Feb 9 10:30:55.806000 audit: BPF prog-id=202 op=UNLOAD Feb 9 10:30:55.806000 audit: BPF prog-id=201 op=UNLOAD Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:55.806000 audit: BPF prog-id=203 op=LOAD Feb 9 10:30:55.806000 audit[6338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2660 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433666263633866653365396639363237336133623264326334346238 Feb 9 10:30:55.824212 env[1350]: time="2024-02-09T10:30:55.824167778Z" level=info msg="StartContainer for \"fddb303cf45174a65ee45a8b4d589a20d712b44805aebd8000119fc69d4cac86\" returns successfully" Feb 9 10:30:55.827219 env[1350]: time="2024-02-09T10:30:55.827186624Z" level=info msg="StartContainer for \"43fbcc8fe3e9f96273a3b2d2c44b8e85c8c51ff27998996a6f807c8b41ae0d9e\" returns successfully" Feb 9 10:30:56.002178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount474001250.mount: Deactivated successfully. Feb 9 10:30:56.986000 audit[6334]: AVC avc: denied { watch } for pid=6334 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:56.986000 audit[6334]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40000f6000 a2=fc6 a3=0 items=0 ppid=2165 pid=6334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:56.986000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:56.986000 audit[6334]: AVC avc: denied { watch } for pid=6334 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:56.986000 audit[6334]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40000e2040 a2=fc6 a3=0 items=0 ppid=2165 pid=6334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c266 key=(null) Feb 9 10:30:56.986000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:58.267385 kubelet[2478]: E0209 10:30:58.266955 2478 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-a099f8e901.17b22b2547390d31", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-a099f8e901", UID:"2691b74587ce28c318c265fe1d19e57b", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-a099f8e901"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 30, 47, 835544881, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 30, 47, 835544881, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.12:55928->10.200.20.10:2379: read: connection timed out' (will not retry!) Feb 9 10:31:00.386088 systemd[1]: cri-containerd-4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97.scope: Deactivated successfully. Feb 9 10:31:00.386389 systemd[1]: cri-containerd-4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97.scope: Consumed 1.719s CPU time. Feb 9 10:31:00.388000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:31:00.388000 audit: BPF prog-id=86 op=UNLOAD Feb 9 10:31:00.406726 env[1350]: time="2024-02-09T10:31:00.403925861Z" level=info msg="shim disconnected" id=4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97 Feb 9 10:31:00.406726 env[1350]: time="2024-02-09T10:31:00.404059456Z" level=warning msg="cleaning up after shim disconnected" id=4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97 namespace=k8s.io Feb 9 10:31:00.406726 env[1350]: time="2024-02-09T10:31:00.404077816Z" level=info msg="cleaning up dead shim" Feb 9 10:31:00.407920 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97-rootfs.mount: Deactivated successfully. Feb 9 10:31:00.414360 env[1350]: time="2024-02-09T10:31:00.414317912Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:31:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6393 runtime=io.containerd.runc.v2\n" Feb 9 10:31:00.567210 kubelet[2478]: I0209 10:31:00.567178 2478 scope.go:115] "RemoveContainer" containerID="4247b1494f11cc099ff5f453e739e585e2c00e839aa9859503b77f04fd1a0e97" Feb 9 10:31:00.569315 env[1350]: time="2024-02-09T10:31:00.569281790Z" level=info msg="CreateContainer within sandbox \"8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 10:31:00.614873 env[1350]: time="2024-02-09T10:31:00.614828084Z" level=info msg="CreateContainer within sandbox \"8df861813047d31a9797fa601213f07ec0ee153c56f0fdff728ea17e590827b2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"c815c7bffd407ad0ddc53d65e3e24f0b44ba18b494d77d2823669407860a1b64\"" Feb 9 10:31:00.617083 env[1350]: time="2024-02-09T10:31:00.617048321Z" level=info msg="StartContainer for \"c815c7bffd407ad0ddc53d65e3e24f0b44ba18b494d77d2823669407860a1b64\"" Feb 9 10:31:00.650927 systemd[1]: Started cri-containerd-c815c7bffd407ad0ddc53d65e3e24f0b44ba18b494d77d2823669407860a1b64.scope. Feb 9 10:31:00.685348 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 9 10:31:00.685464 kernel: audit: type=1400 audit(1707474660.659:1688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.723127 kernel: audit: type=1400 audit(1707474660.659:1689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.723214 kernel: audit: type=1400 audit(1707474660.659:1690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.761348 kernel: audit: type=1400 audit(1707474660.659:1691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.761433 kernel: audit: type=1400 audit(1707474660.659:1692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.799526 kernel: audit: type=1400 audit(1707474660.659:1693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.799611 kernel: audit: type=1400 audit(1707474660.659:1694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.819445 kernel: audit: type=1400 audit(1707474660.659:1695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.857557 kernel: audit: type=1400 audit(1707474660.659:1696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.857629 kernel: audit: type=1400 audit(1707474660.660:1697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.660000 audit: BPF prog-id=204 op=LOAD Feb 9 10:31:00.857963 env[1350]: time="2024-02-09T10:31:00.857901102Z" level=info msg="StartContainer for \"c815c7bffd407ad0ddc53d65e3e24f0b44ba18b494d77d2823669407860a1b64\" returns successfully" Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2193 pid=6415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:00.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313563376266666434303761643064646335336436356533653234 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2193 pid=6415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:00.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313563376266666434303761643064646335336436356533653234 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.665000 audit: BPF prog-id=205 op=LOAD Feb 9 10:31:00.665000 audit[6415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2193 pid=6415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:00.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313563376266666434303761643064646335336436356533653234 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit: BPF prog-id=206 op=LOAD Feb 9 10:31:00.683000 audit[6415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2193 pid=6415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:00.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313563376266666434303761643064646335336436356533653234 Feb 9 10:31:00.683000 audit: BPF prog-id=206 op=UNLOAD Feb 9 10:31:00.683000 audit: BPF prog-id=205 op=UNLOAD Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { perfmon } for pid=6415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit[6415]: AVC avc: denied { bpf } for pid=6415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:00.683000 audit: BPF prog-id=207 op=LOAD Feb 9 10:31:00.683000 audit[6415]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2193 pid=6415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:00.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313563376266666434303761643064646335336436356533653234 Feb 9 10:31:01.407959 systemd[1]: run-containerd-runc-k8s.io-c815c7bffd407ad0ddc53d65e3e24f0b44ba18b494d77d2823669407860a1b64-runc.rs3xbU.mount: Deactivated successfully. Feb 9 10:31:04.682635 kubelet[2478]: E0209 10:31:04.682592 2478 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:09.460052 systemd[1]: run-containerd-runc-k8s.io-cc840ace1c81c4db92e1ba96a83564dc00de403ad752e867a83eed37fb42eab2-runc.elV1vi.mount: Deactivated successfully. Feb 9 10:31:14.237273 systemd[1]: run-containerd-runc-k8s.io-efbc72f77eb077a135475753fc0eb19d624223fa05f3cad2c4f725084bafb2f6-runc.Ai71Tk.mount: Deactivated successfully. Feb 9 10:31:14.683226 kubelet[2478]: E0209 10:31:14.682946 2478 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-a099f8e901?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:15.334816 systemd[1]: run-containerd-runc-k8s.io-9e02a14997caabc37385a4a3db6d9888f708bc4f6d60fbc4b84e3b9ccdb72e26-runc.YhsR3Z.mount: Deactivated successfully. Feb 9 10:31:15.364338 systemd[1]: run-containerd-runc-k8s.io-59c39942ce4beea26b98a28d81d3422873d5ef9317a242c4b9ece402abd66fe0-runc.RXfais.mount: Deactivated successfully.