Feb 9 18:31:57.015426 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:31:57.015446 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:31:57.015453 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 18:31:57.015461 kernel: printk: bootconsole [pl11] enabled Feb 9 18:31:57.015466 kernel: efi: EFI v2.70 by EDK II Feb 9 18:31:57.015472 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 18:31:57.015478 kernel: random: crng init done Feb 9 18:31:57.015483 kernel: ACPI: Early table checksum verification disabled Feb 9 18:31:57.015489 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 18:31:57.015494 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015500 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015506 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 18:31:57.015512 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015517 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015524 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015530 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015535 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015543 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015548 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 18:31:57.015554 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:57.015560 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 18:31:57.015566 kernel: NUMA: Failed to initialise from firmware Feb 9 18:31:57.015571 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:31:57.015577 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 18:31:57.015583 kernel: Zone ranges: Feb 9 18:31:57.015589 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 18:31:57.015594 kernel: DMA32 empty Feb 9 18:31:57.015601 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:31:57.015607 kernel: Movable zone start for each node Feb 9 18:31:57.015613 kernel: Early memory node ranges Feb 9 18:31:57.015618 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 18:31:57.015624 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 18:31:57.015630 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 18:31:57.015635 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 18:31:57.015641 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 18:31:57.015647 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 18:31:57.015737 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 18:31:57.015743 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 18:31:57.015749 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:31:57.015757 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:31:57.015766 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 18:31:57.015772 kernel: psci: probing for conduit method from ACPI. Feb 9 18:31:57.015778 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:31:57.015784 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:31:57.015792 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 18:31:57.015798 kernel: psci: SMC Calling Convention v1.4 Feb 9 18:31:57.015804 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 18:31:57.015810 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 18:31:57.015816 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:31:57.015822 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:31:57.015828 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 18:31:57.015835 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:31:57.015841 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:31:57.015847 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:31:57.015853 kernel: CPU features: detected: Spectre-BHB Feb 9 18:31:57.015859 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:31:57.015866 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:31:57.015872 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:31:57.015878 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 18:31:57.015884 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 18:31:57.015891 kernel: Policy zone: Normal Feb 9 18:31:57.015899 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:31:57.015905 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:31:57.015911 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:31:57.015918 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:31:57.015924 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:31:57.015931 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 18:31:57.015938 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 18:31:57.015944 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:31:57.015950 kernel: trace event string verifier disabled Feb 9 18:31:57.015956 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:31:57.015963 kernel: rcu: RCU event tracing is enabled. Feb 9 18:31:57.015969 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:31:57.015975 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:31:57.015981 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:31:57.015987 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:31:57.015993 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:31:57.016000 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:31:57.016006 kernel: GICv3: 960 SPIs implemented Feb 9 18:31:57.016012 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:31:57.016018 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:31:57.016024 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:31:57.016030 kernel: GICv3: 16 PPIs implemented Feb 9 18:31:57.016037 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 18:31:57.016043 kernel: ITS: No ITS available, not enabling LPIs Feb 9 18:31:57.016049 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:31:57.016055 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:31:57.016061 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:31:57.016067 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:31:57.016075 kernel: Console: colour dummy device 80x25 Feb 9 18:31:57.016081 kernel: printk: console [tty1] enabled Feb 9 18:31:57.016088 kernel: ACPI: Core revision 20210730 Feb 9 18:31:57.016094 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:31:57.016101 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:31:57.016107 kernel: LSM: Security Framework initializing Feb 9 18:31:57.016113 kernel: SELinux: Initializing. Feb 9 18:31:57.016119 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:31:57.016126 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:31:57.016133 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 18:31:57.016140 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 18:31:57.016146 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:31:57.016152 kernel: Remapping and enabling EFI services. Feb 9 18:31:57.016158 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:31:57.016164 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:31:57.016171 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 18:31:57.016177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:31:57.016183 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:31:57.016190 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:31:57.016197 kernel: SMP: Total of 2 processors activated. Feb 9 18:31:57.016203 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:31:57.016209 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 18:31:57.016216 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:31:57.016222 kernel: CPU features: detected: CRC32 instructions Feb 9 18:31:57.016229 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:31:57.016235 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:31:57.016241 kernel: CPU features: detected: Privileged Access Never Feb 9 18:31:57.016248 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:31:57.016255 kernel: alternatives: patching kernel code Feb 9 18:31:57.016266 kernel: devtmpfs: initialized Feb 9 18:31:57.016274 kernel: KASLR enabled Feb 9 18:31:57.016280 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:31:57.016287 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:31:57.016293 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:31:57.016300 kernel: SMBIOS 3.1.0 present. Feb 9 18:31:57.016307 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 18:31:57.016313 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:31:57.016321 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:31:57.016328 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:31:57.016335 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:31:57.016341 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:31:57.016348 kernel: audit: type=2000 audit(0.091:1): state=initialized audit_enabled=0 res=1 Feb 9 18:31:57.016355 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:31:57.016361 kernel: cpuidle: using governor menu Feb 9 18:31:57.016369 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:31:57.016376 kernel: ASID allocator initialised with 32768 entries Feb 9 18:31:57.016382 kernel: ACPI: bus type PCI registered Feb 9 18:31:57.016389 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:31:57.016396 kernel: Serial: AMBA PL011 UART driver Feb 9 18:31:57.016402 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:31:57.016409 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:31:57.016416 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:31:57.016422 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:31:57.016430 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:31:57.016437 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:31:57.016443 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:31:57.016450 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:31:57.016456 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:31:57.016463 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:31:57.016470 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:31:57.016476 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:31:57.016488 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:31:57.016496 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:31:57.016503 kernel: ACPI: Interpreter enabled Feb 9 18:31:57.016510 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:31:57.016516 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:31:57.016523 kernel: printk: console [ttyAMA0] enabled Feb 9 18:31:57.016529 kernel: printk: bootconsole [pl11] disabled Feb 9 18:31:57.016536 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 18:31:57.016543 kernel: iommu: Default domain type: Translated Feb 9 18:31:57.016549 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:31:57.016557 kernel: vgaarb: loaded Feb 9 18:31:57.016564 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:31:57.016571 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:31:57.016577 kernel: PTP clock support registered Feb 9 18:31:57.016584 kernel: Registered efivars operations Feb 9 18:31:57.016590 kernel: No ACPI PMU IRQ for CPU0 Feb 9 18:31:57.016597 kernel: No ACPI PMU IRQ for CPU1 Feb 9 18:31:57.016603 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:31:57.016610 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:31:57.016618 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:31:57.016624 kernel: pnp: PnP ACPI init Feb 9 18:31:57.016631 kernel: pnp: PnP ACPI: found 0 devices Feb 9 18:31:57.016638 kernel: NET: Registered PF_INET protocol family Feb 9 18:31:57.016644 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:31:57.016659 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:31:57.016666 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:31:57.016672 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:31:57.016679 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:31:57.016687 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:31:57.016694 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:31:57.016701 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:31:57.016707 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:31:57.016714 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:31:57.016720 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 18:31:57.016727 kernel: kvm [1]: HYP mode not available Feb 9 18:31:57.016733 kernel: Initialise system trusted keyrings Feb 9 18:31:57.016740 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:31:57.016748 kernel: Key type asymmetric registered Feb 9 18:31:57.016754 kernel: Asymmetric key parser 'x509' registered Feb 9 18:31:57.016761 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:31:57.016768 kernel: io scheduler mq-deadline registered Feb 9 18:31:57.016774 kernel: io scheduler kyber registered Feb 9 18:31:57.016781 kernel: io scheduler bfq registered Feb 9 18:31:57.016787 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:31:57.016794 kernel: thunder_xcv, ver 1.0 Feb 9 18:31:57.016800 kernel: thunder_bgx, ver 1.0 Feb 9 18:31:57.016808 kernel: nicpf, ver 1.0 Feb 9 18:31:57.016815 kernel: nicvf, ver 1.0 Feb 9 18:31:57.016940 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:31:57.017001 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:31:56 UTC (1707503516) Feb 9 18:31:57.017010 kernel: efifb: probing for efifb Feb 9 18:31:57.017017 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 18:31:57.017024 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 18:31:57.017031 kernel: efifb: scrolling: redraw Feb 9 18:31:57.017039 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 18:31:57.017046 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:31:57.017053 kernel: fb0: EFI VGA frame buffer device Feb 9 18:31:57.017059 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 18:31:57.017066 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:31:57.017073 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:31:57.017079 kernel: Segment Routing with IPv6 Feb 9 18:31:57.017086 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:31:57.017092 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:31:57.017100 kernel: Key type dns_resolver registered Feb 9 18:31:57.017107 kernel: registered taskstats version 1 Feb 9 18:31:57.017113 kernel: Loading compiled-in X.509 certificates Feb 9 18:31:57.017120 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:31:57.017127 kernel: Key type .fscrypt registered Feb 9 18:31:57.017133 kernel: Key type fscrypt-provisioning registered Feb 9 18:31:57.017140 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:31:57.017146 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:31:57.017153 kernel: ima: No architecture policies found Feb 9 18:31:57.017161 kernel: Freeing unused kernel memory: 34688K Feb 9 18:31:57.017167 kernel: Run /init as init process Feb 9 18:31:57.017174 kernel: with arguments: Feb 9 18:31:57.017180 kernel: /init Feb 9 18:31:57.017187 kernel: with environment: Feb 9 18:31:57.017193 kernel: HOME=/ Feb 9 18:31:57.017200 kernel: TERM=linux Feb 9 18:31:57.017206 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:31:57.017215 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:31:57.017225 systemd[1]: Detected virtualization microsoft. Feb 9 18:31:57.017232 systemd[1]: Detected architecture arm64. Feb 9 18:31:57.017239 systemd[1]: Running in initrd. Feb 9 18:31:57.017246 systemd[1]: No hostname configured, using default hostname. Feb 9 18:31:57.017253 systemd[1]: Hostname set to . Feb 9 18:31:57.017261 systemd[1]: Initializing machine ID from random generator. Feb 9 18:31:57.017268 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:31:57.017277 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:31:57.017284 systemd[1]: Reached target cryptsetup.target. Feb 9 18:31:57.017291 systemd[1]: Reached target paths.target. Feb 9 18:31:57.017298 systemd[1]: Reached target slices.target. Feb 9 18:31:57.017305 systemd[1]: Reached target swap.target. Feb 9 18:31:57.017312 systemd[1]: Reached target timers.target. Feb 9 18:31:57.017319 systemd[1]: Listening on iscsid.socket. Feb 9 18:31:57.017326 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:31:57.017335 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:31:57.017342 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:31:57.017349 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:31:57.017357 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:31:57.017364 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:31:57.017371 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:31:57.017378 systemd[1]: Reached target sockets.target. Feb 9 18:31:57.017385 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:31:57.017392 systemd[1]: Finished network-cleanup.service. Feb 9 18:31:57.017401 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:31:57.017408 systemd[1]: Starting systemd-journald.service... Feb 9 18:31:57.017415 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:31:57.017422 systemd[1]: Starting systemd-resolved.service... Feb 9 18:31:57.017429 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:31:57.017440 systemd-journald[276]: Journal started Feb 9 18:31:57.017477 systemd-journald[276]: Runtime Journal (/run/log/journal/50af6e7bc3914b2cabc47a961b2e79aa) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:31:57.004766 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 18:31:57.038510 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:31:57.043835 systemd-resolved[278]: Positive Trust Anchors: Feb 9 18:31:57.043849 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:31:57.066729 systemd[1]: Started systemd-journald.service. Feb 9 18:31:57.066752 kernel: Bridge firewalling registered Feb 9 18:31:57.043874 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:31:57.129483 kernel: audit: type=1130 audit(1707503517.108:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.129507 kernel: SCSI subsystem initialized Feb 9 18:31:57.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.045938 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 18:31:57.143744 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:31:57.070200 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 18:31:57.208387 kernel: audit: type=1130 audit(1707503517.138:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.208411 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:31:57.208420 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:31:57.208428 kernel: audit: type=1130 audit(1707503517.174:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.109036 systemd[1]: Started systemd-resolved.service. Feb 9 18:31:57.254025 kernel: audit: type=1130 audit(1707503517.208:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.254056 kernel: audit: type=1130 audit(1707503517.231:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.139127 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:31:57.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.174409 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:31:57.288362 kernel: audit: type=1130 audit(1707503517.260:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.203411 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 18:31:57.209023 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:31:57.232355 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:31:57.284122 systemd[1]: Reached target nss-lookup.target. Feb 9 18:31:57.360596 kernel: audit: type=1130 audit(1707503517.341:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.298117 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:31:57.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.304266 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:31:57.395263 kernel: audit: type=1130 audit(1707503517.364:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.310098 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:31:57.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.321789 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:31:57.428524 dracut-cmdline[298]: dracut-dracut-053 Feb 9 18:31:57.428524 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Feb 9 18:31:57.428524 dracut-cmdline[298]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:31:57.469109 kernel: audit: type=1130 audit(1707503517.390:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.342239 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:31:57.365429 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:31:57.391917 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:31:57.488672 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:31:57.505684 kernel: iscsi: registered transport (tcp) Feb 9 18:31:57.519942 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:31:57.519960 kernel: QLogic iSCSI HBA Driver Feb 9 18:31:57.549646 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:31:57.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:57.559517 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:31:57.609687 kernel: raid6: neonx8 gen() 13810 MB/s Feb 9 18:31:57.628679 kernel: raid6: neonx8 xor() 10821 MB/s Feb 9 18:31:57.649682 kernel: raid6: neonx4 gen() 13523 MB/s Feb 9 18:31:57.670675 kernel: raid6: neonx4 xor() 11165 MB/s Feb 9 18:31:57.692676 kernel: raid6: neonx2 gen() 12968 MB/s Feb 9 18:31:57.713680 kernel: raid6: neonx2 xor() 10245 MB/s Feb 9 18:31:57.733663 kernel: raid6: neonx1 gen() 10486 MB/s Feb 9 18:31:57.754666 kernel: raid6: neonx1 xor() 8787 MB/s Feb 9 18:31:57.775662 kernel: raid6: int64x8 gen() 6281 MB/s Feb 9 18:31:57.795662 kernel: raid6: int64x8 xor() 3539 MB/s Feb 9 18:31:57.817665 kernel: raid6: int64x4 gen() 7239 MB/s Feb 9 18:31:57.838664 kernel: raid6: int64x4 xor() 3857 MB/s Feb 9 18:31:57.859667 kernel: raid6: int64x2 gen() 6147 MB/s Feb 9 18:31:57.881677 kernel: raid6: int64x2 xor() 3319 MB/s Feb 9 18:31:57.902668 kernel: raid6: int64x1 gen() 5041 MB/s Feb 9 18:31:57.929525 kernel: raid6: int64x1 xor() 2641 MB/s Feb 9 18:31:57.929537 kernel: raid6: using algorithm neonx8 gen() 13810 MB/s Feb 9 18:31:57.929546 kernel: raid6: .... xor() 10821 MB/s, rmw enabled Feb 9 18:31:57.934448 kernel: raid6: using neon recovery algorithm Feb 9 18:31:57.952668 kernel: xor: measuring software checksum speed Feb 9 18:31:57.957663 kernel: 8regs : 17286 MB/sec Feb 9 18:31:57.966382 kernel: 32regs : 20744 MB/sec Feb 9 18:31:57.966398 kernel: arm64_neon : 27901 MB/sec Feb 9 18:31:57.966407 kernel: xor: using function: arm64_neon (27901 MB/sec) Feb 9 18:31:58.030678 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:31:58.041399 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:31:58.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:58.050000 audit: BPF prog-id=7 op=LOAD Feb 9 18:31:58.050000 audit: BPF prog-id=8 op=LOAD Feb 9 18:31:58.051582 systemd[1]: Starting systemd-udevd.service... Feb 9 18:31:58.070749 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 18:31:58.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:58.077643 systemd[1]: Started systemd-udevd.service. Feb 9 18:31:58.089106 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:31:58.108631 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 18:31:58.142452 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:31:58.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:58.148625 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:31:58.181392 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:31:58.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:58.234681 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 18:31:58.247676 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 18:31:58.247725 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 18:31:58.253696 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 18:31:58.265586 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 18:31:58.265629 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 18:31:58.282347 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 18:31:58.290678 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 18:31:58.301965 kernel: scsi host0: storvsc_host_t Feb 9 18:31:58.302160 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 18:31:58.309207 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 18:31:58.312591 kernel: scsi host1: storvsc_host_t Feb 9 18:31:58.336691 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 18:31:58.336905 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:31:58.338668 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 18:31:58.353524 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 18:31:58.353736 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 18:31:58.357948 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 18:31:58.364948 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 18:31:58.365091 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 18:31:58.372668 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:58.385081 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 18:31:58.385242 kernel: hv_netvsc 000d3afc-43fd-000d-3afc-43fd000d3afc eth0: VF slot 1 added Feb 9 18:31:58.403726 kernel: hv_vmbus: registering driver hv_pci Feb 9 18:31:58.403776 kernel: hv_pci 071e38b9-7b65-4a48-a6e4-c355717faf78: PCI VMBus probing: Using version 0x10004 Feb 9 18:31:58.419435 kernel: hv_pci 071e38b9-7b65-4a48-a6e4-c355717faf78: PCI host bridge to bus 7b65:00 Feb 9 18:31:58.419618 kernel: pci_bus 7b65:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 18:31:58.426080 kernel: pci_bus 7b65:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 18:31:58.433700 kernel: pci 7b65:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 18:31:58.444783 kernel: pci 7b65:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:31:58.467128 kernel: pci 7b65:00:02.0: enabling Extended Tags Feb 9 18:31:58.491825 kernel: pci 7b65:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7b65:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 18:31:58.492067 kernel: pci_bus 7b65:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 18:31:58.492149 kernel: pci 7b65:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:31:58.538687 kernel: mlx5_core 7b65:00:02.0: firmware version: 16.30.1284 Feb 9 18:31:58.694681 kernel: mlx5_core 7b65:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 18:31:58.756644 kernel: hv_netvsc 000d3afc-43fd-000d-3afc-43fd000d3afc eth0: VF registering: eth1 Feb 9 18:31:58.756859 kernel: mlx5_core 7b65:00:02.0 eth1: joined to eth0 Feb 9 18:31:58.770685 kernel: mlx5_core 7b65:00:02.0 enP31589s1: renamed from eth1 Feb 9 18:31:58.896290 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:31:58.931684 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (530) Feb 9 18:31:58.944378 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:31:59.086900 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:31:59.097212 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:31:59.104029 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:31:59.117763 systemd[1]: Starting disk-uuid.service... Feb 9 18:31:59.148163 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:59.154687 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:32:00.164175 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:32:00.165068 disk-uuid[603]: The operation has completed successfully. Feb 9 18:32:00.220348 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:32:00.222802 systemd[1]: Finished disk-uuid.service. Feb 9 18:32:00.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.239224 systemd[1]: Starting verity-setup.service... Feb 9 18:32:00.280914 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:32:00.513038 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:32:00.519326 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:32:00.531849 systemd[1]: Finished verity-setup.service. Feb 9 18:32:00.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.596685 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:32:00.597338 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:32:00.602360 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:32:00.603163 systemd[1]: Starting ignition-setup.service... Feb 9 18:32:00.619888 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:32:00.654470 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:32:00.654518 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:32:00.659168 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:32:00.715082 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:32:00.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.725000 audit: BPF prog-id=9 op=LOAD Feb 9 18:32:00.726310 systemd[1]: Starting systemd-networkd.service... Feb 9 18:32:00.749163 systemd-networkd[844]: lo: Link UP Feb 9 18:32:00.749175 systemd-networkd[844]: lo: Gained carrier Feb 9 18:32:00.749948 systemd-networkd[844]: Enumeration completed Feb 9 18:32:00.750963 systemd-networkd[844]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:32:00.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.754717 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:32:00.755049 systemd[1]: Started systemd-networkd.service. Feb 9 18:32:00.769072 systemd[1]: Reached target network.target. Feb 9 18:32:00.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.781816 systemd[1]: Starting iscsiuio.service... Feb 9 18:32:00.794265 systemd[1]: Started iscsiuio.service. Feb 9 18:32:00.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.827892 iscsid[853]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:32:00.827892 iscsid[853]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 18:32:00.827892 iscsid[853]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:32:00.827892 iscsid[853]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:32:00.827892 iscsid[853]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:32:00.827892 iscsid[853]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:32:00.827892 iscsid[853]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:32:00.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.802101 systemd[1]: Starting iscsid.service... Feb 9 18:32:00.814474 systemd[1]: Started iscsid.service. Feb 9 18:32:00.824368 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:32:00.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:00.846277 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:32:00.865536 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:32:00.884255 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:32:00.895032 systemd[1]: Reached target remote-fs.target. Feb 9 18:32:00.913665 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:32:00.932111 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:32:01.004677 kernel: mlx5_core 7b65:00:02.0 enP31589s1: Link up Feb 9 18:32:01.010466 systemd[1]: Finished ignition-setup.service. Feb 9 18:32:01.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:01.047362 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 18:32:01.047419 kernel: audit: type=1130 audit(1707503521.014:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:01.047431 kernel: hv_netvsc 000d3afc-43fd-000d-3afc-43fd000d3afc eth0: Data path switched to VF: enP31589s1 Feb 9 18:32:01.047878 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:32:01.078179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:32:01.068233 systemd-networkd[844]: enP31589s1: Link UP Feb 9 18:32:01.068330 systemd-networkd[844]: eth0: Link UP Feb 9 18:32:01.068466 systemd-networkd[844]: eth0: Gained carrier Feb 9 18:32:01.077768 systemd-networkd[844]: enP31589s1: Gained carrier Feb 9 18:32:01.090713 systemd-networkd[844]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:32:02.648912 systemd-networkd[844]: eth0: Gained IPv6LL Feb 9 18:32:03.905989 ignition[868]: Ignition 2.14.0 Feb 9 18:32:03.905999 ignition[868]: Stage: fetch-offline Feb 9 18:32:03.906055 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:03.906077 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:04.015506 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:04.015693 ignition[868]: parsed url from cmdline: "" Feb 9 18:32:04.015697 ignition[868]: no config URL provided Feb 9 18:32:04.015702 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:32:04.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.023908 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:32:04.066174 kernel: audit: type=1130 audit(1707503524.033:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.015711 ignition[868]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:32:04.059200 systemd[1]: Starting ignition-fetch.service... Feb 9 18:32:04.015716 ignition[868]: failed to fetch config: resource requires networking Feb 9 18:32:04.015821 ignition[868]: Ignition finished successfully Feb 9 18:32:04.075929 ignition[875]: Ignition 2.14.0 Feb 9 18:32:04.075935 ignition[875]: Stage: fetch Feb 9 18:32:04.076038 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:04.076055 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:04.078674 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:04.080675 ignition[875]: parsed url from cmdline: "" Feb 9 18:32:04.080683 ignition[875]: no config URL provided Feb 9 18:32:04.080691 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:32:04.080702 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:32:04.080733 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 18:32:04.175956 ignition[875]: GET result: OK Feb 9 18:32:04.176066 ignition[875]: config has been read from IMDS userdata Feb 9 18:32:04.176135 ignition[875]: parsing config with SHA512: 2ee764e55e01d80d85e4e6bb3009c5751935cfe8394ba81b1fe7999253dd916c18fba7d423790bba6a1cb59dabc648e36f551c2b57da48dd5107dd6428ecaa2c Feb 9 18:32:04.207581 unknown[875]: fetched base config from "system" Feb 9 18:32:04.211162 unknown[875]: fetched base config from "system" Feb 9 18:32:04.211784 ignition[875]: fetch: fetch complete Feb 9 18:32:04.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.211169 unknown[875]: fetched user config from "azure" Feb 9 18:32:04.256510 kernel: audit: type=1130 audit(1707503524.222:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.211789 ignition[875]: fetch: fetch passed Feb 9 18:32:04.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.217334 systemd[1]: Finished ignition-fetch.service. Feb 9 18:32:04.289468 kernel: audit: type=1130 audit(1707503524.264:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.211838 ignition[875]: Ignition finished successfully Feb 9 18:32:04.244032 systemd[1]: Starting ignition-kargs.service... Feb 9 18:32:04.252170 ignition[881]: Ignition 2.14.0 Feb 9 18:32:04.260596 systemd[1]: Finished ignition-kargs.service. Feb 9 18:32:04.252176 ignition[881]: Stage: kargs Feb 9 18:32:04.252286 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:04.307192 systemd[1]: Starting ignition-disks.service... Feb 9 18:32:04.252304 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:04.332171 systemd[1]: Finished ignition-disks.service. Feb 9 18:32:04.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.254906 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:04.383588 kernel: audit: type=1130 audit(1707503524.340:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.362319 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:32:04.257200 ignition[881]: kargs: kargs passed Feb 9 18:32:04.371549 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:32:04.257259 ignition[881]: Ignition finished successfully Feb 9 18:32:04.378722 systemd[1]: Reached target local-fs.target. Feb 9 18:32:04.321177 ignition[887]: Ignition 2.14.0 Feb 9 18:32:04.388465 systemd[1]: Reached target sysinit.target. Feb 9 18:32:04.321183 ignition[887]: Stage: disks Feb 9 18:32:04.398666 systemd[1]: Reached target basic.target. Feb 9 18:32:04.321281 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:04.412027 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:32:04.321299 ignition[887]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:04.323759 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:04.331326 ignition[887]: disks: disks passed Feb 9 18:32:04.331392 ignition[887]: Ignition finished successfully Feb 9 18:32:04.474526 systemd-fsck[896]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 18:32:04.492466 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:32:04.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.520849 systemd[1]: Mounting sysroot.mount... Feb 9 18:32:04.528252 kernel: audit: type=1130 audit(1707503524.496:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.550677 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:32:04.551169 systemd[1]: Mounted sysroot.mount. Feb 9 18:32:04.555147 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:32:04.591556 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:32:04.596458 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 18:32:04.604147 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:32:04.604183 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:32:04.610302 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:32:04.713274 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:32:04.718433 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:32:04.742689 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Feb 9 18:32:04.749468 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:32:04.760379 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:32:04.760444 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:32:04.760455 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:32:04.769739 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:32:04.780336 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:32:04.789888 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:32:04.814318 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:32:05.244842 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:32:05.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.270394 systemd[1]: Starting ignition-mount.service... Feb 9 18:32:05.281301 kernel: audit: type=1130 audit(1707503525.249:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.280243 systemd[1]: Starting sysroot-boot.service... Feb 9 18:32:05.290679 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:32:05.290815 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:32:05.315451 systemd[1]: Finished sysroot-boot.service. Feb 9 18:32:05.324093 ignition[976]: INFO : Ignition 2.14.0 Feb 9 18:32:05.324093 ignition[976]: INFO : Stage: mount Feb 9 18:32:05.324093 ignition[976]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:05.324093 ignition[976]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:05.390276 kernel: audit: type=1130 audit(1707503525.327:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.390302 kernel: audit: type=1130 audit(1707503525.350:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.345976 systemd[1]: Finished ignition-mount.service. Feb 9 18:32:05.394465 ignition[976]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:05.394465 ignition[976]: INFO : mount: mount passed Feb 9 18:32:05.394465 ignition[976]: INFO : Ignition finished successfully Feb 9 18:32:05.910212 coreos-metadata[906]: Feb 09 18:32:05.910 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:32:05.920038 coreos-metadata[906]: Feb 09 18:32:05.920 INFO Fetch successful Feb 9 18:32:05.953015 coreos-metadata[906]: Feb 09 18:32:05.952 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:32:05.969152 coreos-metadata[906]: Feb 09 18:32:05.969 INFO Fetch successful Feb 9 18:32:05.974898 coreos-metadata[906]: Feb 09 18:32:05.970 INFO wrote hostname ci-3510.3.2-a-9ade464be9 to /sysroot/etc/hostname Feb 9 18:32:05.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.972774 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 18:32:06.015043 kernel: audit: type=1130 audit(1707503525.979:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.980975 systemd[1]: Starting ignition-files.service... Feb 9 18:32:06.013640 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:32:06.035672 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Feb 9 18:32:06.047661 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:32:06.047680 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:32:06.053855 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:32:06.058454 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:32:06.071979 ignition[1004]: INFO : Ignition 2.14.0 Feb 9 18:32:06.071979 ignition[1004]: INFO : Stage: files Feb 9 18:32:06.083299 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:06.083299 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:06.083299 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:06.083299 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:32:06.116741 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:32:06.116741 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:32:06.163954 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:32:06.172500 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:32:06.187356 unknown[1004]: wrote ssh authorized keys file for user: core Feb 9 18:32:06.193113 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:32:06.193113 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:32:06.193113 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:32:06.516579 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:32:06.666748 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 18:32:06.683494 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:32:06.683494 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:32:06.683494 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 18:32:06.998591 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:32:07.366790 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:32:07.366790 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:32:07.388866 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 18:32:07.618772 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:32:07.885241 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 18:32:07.902935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:32:07.902935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:32:07.902935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 9 18:32:08.062504 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:32:08.374969 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 9 18:32:08.391935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:32:08.391935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:32:08.391935 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:32:08.432967 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 18:32:08.722683 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 9 18:32:08.739378 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:32:08.739378 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:32:08.739378 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:32:08.782449 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 18:32:11.655406 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:32:11.672822 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:32:11.861752 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1009) Feb 9 18:32:11.861777 kernel: audit: type=1130 audit(1707503531.829:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem541032291" Feb 9 18:32:11.861833 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem541032291": device or resource busy Feb 9 18:32:11.861833 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem541032291", trying btrfs: device or resource busy Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem541032291" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem541032291" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem541032291" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem541032291" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:32:11.861833 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3757804187" Feb 9 18:32:11.861833 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3757804187": device or resource busy Feb 9 18:32:11.861833 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3757804187", trying btrfs: device or resource busy Feb 9 18:32:12.122010 kernel: audit: type=1130 audit(1707503531.933:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.122051 kernel: audit: type=1131 audit(1707503531.961:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.122062 kernel: audit: type=1130 audit(1707503531.992:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.122072 kernel: audit: type=1130 audit(1707503532.092:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.746907 systemd[1]: mnt-oem541032291.mount: Deactivated successfully. Feb 9 18:32:12.129572 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3757804187" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3757804187" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3757804187" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3757804187" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 18:32:12.129572 ignition[1004]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:32:12.440089 kernel: audit: type=1131 audit(1707503532.124:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.440127 kernel: audit: type=1130 audit(1707503532.224:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.440140 kernel: audit: type=1131 audit(1707503532.311:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.815232 systemd[1]: Finished ignition-files.service. Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(23): [started] setting preset to enabled for "waagent.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: op(23): [finished] setting preset to enabled for "waagent.service" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:32:12.448279 ignition[1004]: INFO : files: files passed Feb 9 18:32:12.448279 ignition[1004]: INFO : Ignition finished successfully Feb 9 18:32:12.699411 kernel: audit: type=1131 audit(1707503532.492:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.699442 kernel: audit: type=1131 audit(1707503532.537:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.699676 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:32:12.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.832330 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:32:12.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.723225 iscsid[853]: iscsid shutting down. Feb 9 18:32:12.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.862143 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:32:12.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.863174 systemd[1]: Starting ignition-quench.service... Feb 9 18:32:12.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:11.890993 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:32:11.891125 systemd[1]: Finished ignition-quench.service. Feb 9 18:32:11.962150 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:32:11.992671 systemd[1]: Reached target ignition-complete.target. Feb 9 18:32:12.790494 ignition[1042]: INFO : Ignition 2.14.0 Feb 9 18:32:12.790494 ignition[1042]: INFO : Stage: umount Feb 9 18:32:12.790494 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:12.790494 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:12.790494 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:12.790494 ignition[1042]: INFO : umount: umount passed Feb 9 18:32:12.790494 ignition[1042]: INFO : Ignition finished successfully Feb 9 18:32:12.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.035808 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:32:12.075705 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:32:12.075833 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:32:12.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.124571 systemd[1]: Reached target initrd-fs.target. Feb 9 18:32:12.133966 systemd[1]: Reached target initrd.target. Feb 9 18:32:12.164143 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:32:12.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.164946 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:32:12.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.209888 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:32:12.936000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:32:12.225190 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:32:12.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.262001 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:32:12.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.271740 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:32:12.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.283781 systemd[1]: Stopped target timers.target. Feb 9 18:32:12.295456 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:32:12.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.295526 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:32:12.311803 systemd[1]: Stopped target initrd.target. Feb 9 18:32:12.346347 systemd[1]: Stopped target basic.target. Feb 9 18:32:12.358203 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:32:13.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.372634 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:32:13.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.389006 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:32:13.049904 kernel: hv_netvsc 000d3afc-43fd-000d-3afc-43fd000d3afc eth0: Data path switched from VF: enP31589s1 Feb 9 18:32:13.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.405648 systemd[1]: Stopped target remote-fs.target. Feb 9 18:32:12.417819 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:32:12.429395 systemd[1]: Stopped target sysinit.target. Feb 9 18:32:13.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.444378 systemd[1]: Stopped target local-fs.target. Feb 9 18:32:13.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:13.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.452485 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:32:12.468562 systemd[1]: Stopped target swap.target. Feb 9 18:32:12.480355 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:32:12.480423 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:32:12.492892 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:32:12.524103 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:32:12.524168 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:32:12.537536 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:32:12.537579 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:32:12.568069 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:32:12.568112 systemd[1]: Stopped ignition-files.service. Feb 9 18:32:12.580445 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 18:32:12.580481 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 18:32:12.594703 systemd[1]: Stopping ignition-mount.service... Feb 9 18:32:12.611745 systemd[1]: Stopping iscsid.service... Feb 9 18:32:12.630104 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:32:12.630198 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:32:12.648037 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:32:12.664400 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:32:12.664471 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:32:12.669463 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:32:13.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:12.669508 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:32:12.686048 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:32:12.686171 systemd[1]: Stopped iscsid.service. Feb 9 18:32:12.693970 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:32:12.694048 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:32:12.704165 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:32:12.704252 systemd[1]: Stopped ignition-mount.service. Feb 9 18:32:12.718482 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:32:12.718875 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:32:12.718922 systemd[1]: Stopped ignition-disks.service. Feb 9 18:32:13.257996 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 18:32:12.727946 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:32:12.727987 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:32:12.735948 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:32:12.735985 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:32:12.742710 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:32:12.742760 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:32:12.757011 systemd[1]: Stopped target paths.target. Feb 9 18:32:12.765736 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:32:12.780648 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:32:12.785913 systemd[1]: Stopped target slices.target. Feb 9 18:32:12.794756 systemd[1]: Stopped target sockets.target. Feb 9 18:32:12.802860 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:32:12.802911 systemd[1]: Closed iscsid.socket. Feb 9 18:32:12.810383 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:32:12.810423 systemd[1]: Stopped ignition-setup.service. Feb 9 18:32:12.822390 systemd[1]: Stopping iscsiuio.service... Feb 9 18:32:12.839429 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:32:12.839526 systemd[1]: Stopped iscsiuio.service. Feb 9 18:32:12.850258 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:32:12.850354 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:32:12.859043 systemd[1]: Stopped target network.target. Feb 9 18:32:12.869679 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:32:12.869724 systemd[1]: Closed iscsiuio.socket. Feb 9 18:32:12.878627 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:32:12.878752 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:32:12.888821 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:32:12.897026 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:32:12.900900 systemd-networkd[844]: eth0: DHCPv6 lease lost Feb 9 18:32:13.258000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:32:12.906229 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:32:12.906322 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:32:12.915917 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:32:12.916013 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:32:12.927824 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:32:12.927859 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:32:12.937158 systemd[1]: Stopping network-cleanup.service... Feb 9 18:32:12.944994 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:32:12.945061 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:32:12.950115 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:32:12.950165 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:32:12.962624 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:32:12.962713 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:32:12.967611 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:32:12.977813 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:32:12.978359 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:32:12.978486 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:32:12.985989 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:32:12.986029 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:32:13.000370 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:32:13.000415 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:32:13.008957 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:32:13.009011 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:32:13.017593 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:32:13.017645 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:32:13.026420 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:32:13.026466 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:32:13.049336 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:32:13.064125 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:32:13.064199 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:32:13.069542 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:32:13.069646 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:32:13.175542 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:32:13.175771 systemd[1]: Stopped network-cleanup.service. Feb 9 18:32:13.184428 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:32:13.195041 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:32:13.212244 systemd[1]: Switching root. Feb 9 18:32:13.259712 systemd-journald[276]: Journal stopped Feb 9 18:32:36.359942 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:32:36.359962 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:32:36.359973 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:32:36.359983 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:32:36.359991 kernel: SELinux: policy capability open_perms=1 Feb 9 18:32:36.359999 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:32:36.360008 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:32:36.360015 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:32:36.360023 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:32:36.360031 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:32:36.360040 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:32:36.360048 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 18:32:36.360056 kernel: audit: type=1403 audit(1707503540.376:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:32:36.360066 systemd[1]: Successfully loaded SELinux policy in 699.262ms. Feb 9 18:32:36.360076 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 109.049ms. Feb 9 18:32:36.360090 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:32:36.360099 systemd[1]: Detected virtualization microsoft. Feb 9 18:32:36.360108 systemd[1]: Detected architecture arm64. Feb 9 18:32:36.360116 systemd[1]: Detected first boot. Feb 9 18:32:36.360126 systemd[1]: Hostname set to . Feb 9 18:32:36.360135 systemd[1]: Initializing machine ID from random generator. Feb 9 18:32:36.360144 kernel: audit: type=1400 audit(1707503542.460:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:36.360155 kernel: audit: type=1400 audit(1707503542.460:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:36.360163 kernel: audit: type=1334 audit(1707503542.480:84): prog-id=10 op=LOAD Feb 9 18:32:36.360172 kernel: audit: type=1334 audit(1707503542.480:85): prog-id=10 op=UNLOAD Feb 9 18:32:36.360180 kernel: audit: type=1334 audit(1707503542.496:86): prog-id=11 op=LOAD Feb 9 18:32:36.360188 kernel: audit: type=1334 audit(1707503542.496:87): prog-id=11 op=UNLOAD Feb 9 18:32:36.360197 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:32:36.360206 kernel: audit: type=1400 audit(1707503547.060:88): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:32:36.360217 kernel: audit: type=1300 audit(1707503547.060:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022294 a1=4000028300 a2=4000026700 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:36.360226 kernel: audit: type=1327 audit(1707503547.060:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:36.360235 kernel: audit: type=1400 audit(1707503547.093:89): avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:32:36.360245 kernel: audit: type=1300 audit(1707503547.093:89): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022379 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:36.360254 kernel: audit: type=1307 audit(1707503547.093:89): cwd="/" Feb 9 18:32:36.360262 kernel: audit: type=1302 audit(1707503547.093:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:36.360273 kernel: audit: type=1302 audit(1707503547.093:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:36.360283 kernel: audit: type=1327 audit(1707503547.093:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:36.360292 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:32:36.360301 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:32:36.360311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:32:36.360323 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:32:36.360334 kernel: audit: type=1334 audit(1707503555.641:90): prog-id=12 op=LOAD Feb 9 18:32:36.360343 kernel: audit: type=1334 audit(1707503555.641:91): prog-id=3 op=UNLOAD Feb 9 18:32:36.360351 kernel: audit: type=1334 audit(1707503555.641:92): prog-id=13 op=LOAD Feb 9 18:32:36.360360 kernel: audit: type=1334 audit(1707503555.641:93): prog-id=14 op=LOAD Feb 9 18:32:36.360369 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:32:36.360378 kernel: audit: type=1334 audit(1707503555.641:94): prog-id=4 op=UNLOAD Feb 9 18:32:36.360386 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:32:36.360396 kernel: audit: type=1334 audit(1707503555.641:95): prog-id=5 op=UNLOAD Feb 9 18:32:36.360405 kernel: audit: type=1334 audit(1707503555.649:96): prog-id=15 op=LOAD Feb 9 18:32:36.360414 kernel: audit: type=1334 audit(1707503555.649:97): prog-id=12 op=UNLOAD Feb 9 18:32:36.360422 kernel: audit: type=1334 audit(1707503555.656:98): prog-id=16 op=LOAD Feb 9 18:32:36.360431 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:32:36.360440 kernel: audit: type=1334 audit(1707503555.662:99): prog-id=17 op=LOAD Feb 9 18:32:36.360449 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:32:36.360459 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:32:36.360468 systemd[1]: Created slice system-getty.slice. Feb 9 18:32:36.360479 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:32:36.360489 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:32:36.360498 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:32:36.360508 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:32:36.360517 systemd[1]: Created slice user.slice. Feb 9 18:32:36.360526 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:32:36.360535 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:32:36.360545 systemd[1]: Set up automount boot.automount. Feb 9 18:32:36.360554 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:32:36.360564 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:32:36.360574 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:32:36.360583 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:32:36.360592 systemd[1]: Reached target integritysetup.target. Feb 9 18:32:36.360601 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:32:36.360611 systemd[1]: Reached target remote-fs.target. Feb 9 18:32:36.360620 systemd[1]: Reached target slices.target. Feb 9 18:32:36.360629 systemd[1]: Reached target swap.target. Feb 9 18:32:36.360639 systemd[1]: Reached target torcx.target. Feb 9 18:32:36.360648 systemd[1]: Reached target veritysetup.target. Feb 9 18:32:36.360665 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:32:36.360675 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:32:36.360685 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:32:36.360695 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:32:36.360706 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:32:36.360715 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:32:36.360725 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:32:36.360734 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:32:36.360743 systemd[1]: Mounting media.mount... Feb 9 18:32:36.360752 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:32:36.360761 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:32:36.360771 systemd[1]: Mounting tmp.mount... Feb 9 18:32:36.360781 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:32:36.360791 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:32:36.360800 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:32:36.360809 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:32:36.360818 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:32:36.360828 systemd[1]: Starting modprobe@drm.service... Feb 9 18:32:36.360837 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:32:36.360846 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:32:36.360856 systemd[1]: Starting modprobe@loop.service... Feb 9 18:32:36.360867 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:32:36.360876 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:32:36.360886 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:32:36.360896 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:32:36.360905 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:32:36.360914 kernel: loop: module loaded Feb 9 18:32:36.360924 systemd[1]: Stopped systemd-journald.service. Feb 9 18:32:36.360934 kernel: fuse: init (API version 7.34) Feb 9 18:32:36.360943 systemd[1]: systemd-journald.service: Consumed 3.298s CPU time. Feb 9 18:32:36.360952 systemd[1]: Starting systemd-journald.service... Feb 9 18:32:36.360962 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:32:36.360971 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:32:36.360981 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:32:36.360990 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:32:36.360999 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:32:36.361010 systemd[1]: Stopped verity-setup.service. Feb 9 18:32:36.361019 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:32:36.361031 systemd-journald[1181]: Journal started Feb 9 18:32:36.361069 systemd-journald[1181]: Runtime Journal (/run/log/journal/64d8b8694de74f1b838a4860fb211215) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:32:20.376000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:32:22.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:22.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:22.480000 audit: BPF prog-id=10 op=LOAD Feb 9 18:32:22.480000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:32:22.496000 audit: BPF prog-id=11 op=LOAD Feb 9 18:32:22.496000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:32:27.060000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:32:27.060000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022294 a1=4000028300 a2=4000026700 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:27.060000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:27.093000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:32:27.093000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022379 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:27.093000 audit: CWD cwd="/" Feb 9 18:32:27.093000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:27.093000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:27.093000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:35.641000 audit: BPF prog-id=12 op=LOAD Feb 9 18:32:35.641000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:32:35.641000 audit: BPF prog-id=13 op=LOAD Feb 9 18:32:35.641000 audit: BPF prog-id=14 op=LOAD Feb 9 18:32:35.641000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:32:35.641000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:32:35.649000 audit: BPF prog-id=15 op=LOAD Feb 9 18:32:35.649000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:32:35.656000 audit: BPF prog-id=16 op=LOAD Feb 9 18:32:35.662000 audit: BPF prog-id=17 op=LOAD Feb 9 18:32:35.662000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:32:35.662000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:32:35.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:35.711000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:32:35.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:35.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.272000 audit: BPF prog-id=18 op=LOAD Feb 9 18:32:36.273000 audit: BPF prog-id=19 op=LOAD Feb 9 18:32:36.273000 audit: BPF prog-id=20 op=LOAD Feb 9 18:32:36.273000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:32:36.273000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:32:36.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.357000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:32:36.357000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe31f94d0 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:36.357000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:32:35.640742 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:32:26.782282 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:32:35.663912 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:32:27.031537 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:32:35.664283 systemd[1]: systemd-journald.service: Consumed 3.298s CPU time. Feb 9 18:32:27.031564 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:32:27.031602 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:32:27.031611 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:32:27.031672 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:32:27.031685 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:32:27.031885 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:32:27.031920 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:32:27.031932 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:32:27.046634 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:32:27.046699 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:32:27.046731 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:32:27.046747 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:32:27.046765 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:32:27.046778 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:32:32.980015 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:32.980273 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:32.980373 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:32.980526 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:32.980579 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:32:32.980634 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:32:36.376180 systemd[1]: Started systemd-journald.service. Feb 9 18:32:36.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.376961 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:32:36.381095 systemd[1]: Mounted media.mount. Feb 9 18:32:36.385059 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:32:36.390009 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:32:36.395030 systemd[1]: Mounted tmp.mount. Feb 9 18:32:36.398998 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:32:36.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.404586 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:32:36.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.410508 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:32:36.410631 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:32:36.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.416536 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:32:36.416675 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:32:36.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.422416 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:32:36.422544 systemd[1]: Finished modprobe@drm.service. Feb 9 18:32:36.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.428212 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:32:36.428346 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:32:36.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.434050 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:32:36.434175 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:32:36.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.438989 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:32:36.439107 systemd[1]: Finished modprobe@loop.service. Feb 9 18:32:36.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.444533 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:32:36.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.450707 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:32:36.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.456817 systemd[1]: Reached target network-pre.target. Feb 9 18:32:36.463535 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:32:36.470060 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:32:36.474770 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:32:36.476730 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:32:36.482695 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:32:36.487876 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:32:36.489019 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:32:36.494148 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:32:36.495344 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:32:36.502109 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:32:36.507693 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:32:36.513206 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:32:36.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.520205 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:32:36.526000 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:32:36.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.534447 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:32:36.539946 systemd-journald[1181]: Time spent on flushing to /var/log/journal/64d8b8694de74f1b838a4860fb211215 is 14.092ms for 1137 entries. Feb 9 18:32:36.539946 systemd-journald[1181]: System Journal (/var/log/journal/64d8b8694de74f1b838a4860fb211215) is 8.0M, max 2.6G, 2.6G free. Feb 9 18:32:38.847800 systemd-journald[1181]: Received client request to flush runtime journal. Feb 9 18:32:36.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:37.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:38.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:38.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:36.605152 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:32:38.854386 udevadm[1193]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 18:32:37.110799 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:32:38.818087 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:32:38.823309 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:32:38.848795 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:32:38.893565 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:32:38.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:38.898000 audit: BPF prog-id=21 op=LOAD Feb 9 18:32:38.898000 audit: BPF prog-id=22 op=LOAD Feb 9 18:32:38.898000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:32:38.898000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:32:38.899916 systemd[1]: Starting systemd-udevd.service... Feb 9 18:32:38.918442 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 9 18:32:39.150049 systemd[1]: Started systemd-udevd.service. Feb 9 18:32:39.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.159000 audit: BPF prog-id=23 op=LOAD Feb 9 18:32:39.162134 systemd[1]: Starting systemd-networkd.service... Feb 9 18:32:39.192188 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:32:39.244000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:32:39.252453 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:32:39.252516 kernel: hv_vmbus: registering driver hv_balloon Feb 9 18:32:39.254338 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:32:39.252000 audit: BPF prog-id=24 op=LOAD Feb 9 18:32:39.252000 audit: BPF prog-id=25 op=LOAD Feb 9 18:32:39.253000 audit: BPF prog-id=26 op=LOAD Feb 9 18:32:39.274877 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 18:32:39.275122 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 18:32:39.275138 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 18:32:39.275151 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 18:32:39.291679 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 18:32:39.303266 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 18:32:39.303336 kernel: Console: switching to colour dummy device 80x25 Feb 9 18:32:39.303372 kernel: hv_vmbus: registering driver hv_utils Feb 9 18:32:39.313913 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:32:39.313992 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 18:32:39.320841 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 18:32:39.324559 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 18:32:39.244000 audit[1206]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab135de940 a1=aa2c a2=ffff9cd424b0 a3=aaab1353c010 items=12 ppid=1198 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:38.977339 systemd-journald[1181]: Time jumped backwards, rotating. Feb 9 18:32:39.244000 audit: CWD cwd="/" Feb 9 18:32:39.244000 audit: PATH item=0 name=(null) inode=6671 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=1 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=2 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=3 name=(null) inode=11414 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=4 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=5 name=(null) inode=11415 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=6 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=7 name=(null) inode=11416 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=8 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=9 name=(null) inode=11417 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=10 name=(null) inode=11413 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PATH item=11 name=(null) inode=11418 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:39.244000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:32:38.978527 systemd[1]: Started systemd-userdbd.service. Feb 9 18:32:38.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.174523 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1199) Feb 9 18:32:39.191553 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:32:39.199901 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:32:39.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.206119 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:32:39.219120 systemd-networkd[1219]: lo: Link UP Feb 9 18:32:39.219354 systemd-networkd[1219]: lo: Gained carrier Feb 9 18:32:39.219997 systemd-networkd[1219]: Enumeration completed Feb 9 18:32:39.220156 systemd[1]: Started systemd-networkd.service. Feb 9 18:32:39.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.226920 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:32:39.248491 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:32:39.297502 kernel: mlx5_core 7b65:00:02.0 enP31589s1: Link up Feb 9 18:32:39.323502 kernel: hv_netvsc 000d3afc-43fd-000d-3afc-43fd000d3afc eth0: Data path switched to VF: enP31589s1 Feb 9 18:32:39.324093 systemd-networkd[1219]: enP31589s1: Link UP Feb 9 18:32:39.324184 systemd-networkd[1219]: eth0: Link UP Feb 9 18:32:39.324192 systemd-networkd[1219]: eth0: Gained carrier Feb 9 18:32:39.327762 systemd-networkd[1219]: enP31589s1: Gained carrier Feb 9 18:32:39.339622 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:32:39.910518 lvm[1275]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:32:39.951383 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:32:39.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.956673 systemd[1]: Reached target cryptsetup.target. Feb 9 18:32:39.962688 systemd[1]: Starting lvm2-activation.service... Feb 9 18:32:39.966619 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:32:39.992389 systemd[1]: Finished lvm2-activation.service. Feb 9 18:32:39.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:39.997084 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:32:40.001880 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:32:40.001910 systemd[1]: Reached target local-fs.target. Feb 9 18:32:40.006281 systemd[1]: Reached target machines.target. Feb 9 18:32:40.012325 systemd[1]: Starting ldconfig.service... Feb 9 18:32:40.017040 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:32:40.017116 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:40.018357 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:32:40.023966 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:32:40.031026 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:32:40.036035 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:32:40.036090 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:32:40.037184 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:32:40.694659 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:32:40.707743 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 18:32:40.707844 kernel: audit: type=1130 audit(1707503560.700:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.701461 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1279 (bootctl) Feb 9 18:32:40.702694 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:32:40.742881 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:32:40.743494 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:32:40.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.766569 kernel: audit: type=1130 audit(1707503560.748:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.781997 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:32:40.886221 systemd-fsck[1287]: fsck.fat 4.2 (2021-01-31) Feb 9 18:32:40.886221 systemd-fsck[1287]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 18:32:40.888069 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:32:40.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.895928 systemd[1]: Mounting boot.mount... Feb 9 18:32:40.916509 kernel: audit: type=1130 audit(1707503560.894:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.914190 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:32:40.920868 systemd[1]: Mounted boot.mount. Feb 9 18:32:40.931700 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:32:40.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:40.954505 kernel: audit: type=1130 audit(1707503560.935:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.008666 systemd-tmpfiles[1282]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:32:41.158634 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 18:32:41.163404 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:32:41.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.187503 kernel: audit: type=1130 audit(1707503561.168:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.638222 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:32:41.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.649937 systemd[1]: Starting audit-rules.service... Feb 9 18:32:41.665833 kernel: audit: type=1130 audit(1707503561.642:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.669824 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:32:41.675349 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:32:41.680000 audit: BPF prog-id=27 op=LOAD Feb 9 18:32:41.688606 systemd[1]: Starting systemd-resolved.service... Feb 9 18:32:41.689507 kernel: audit: type=1334 audit(1707503561.680:162): prog-id=27 op=LOAD Feb 9 18:32:41.693000 audit: BPF prog-id=28 op=LOAD Feb 9 18:32:41.695119 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:32:41.705325 kernel: audit: type=1334 audit(1707503561.693:163): prog-id=28 op=LOAD Feb 9 18:32:41.709075 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:32:41.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.726972 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:32:41.750805 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:32:41.758607 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:32:41.783598 kernel: audit: type=1130 audit(1707503561.731:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.784066 kernel: audit: type=1127 audit(1707503561.756:165): pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.756000 audit[1304]: SYSTEM_BOOT pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.817075 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:32:41.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.832749 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:32:41.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.837607 systemd[1]: Reached target time-set.target. Feb 9 18:32:41.876872 systemd-resolved[1297]: Positive Trust Anchors: Feb 9 18:32:41.876885 systemd-resolved[1297]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:32:41.876912 systemd-resolved[1297]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:32:41.909978 systemd-resolved[1297]: Using system hostname 'ci-3510.3.2-a-9ade464be9'. Feb 9 18:32:41.911441 systemd[1]: Started systemd-resolved.service. Feb 9 18:32:41.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:41.916186 systemd[1]: Reached target network.target. Feb 9 18:32:41.920522 systemd[1]: Reached target network-online.target. Feb 9 18:32:41.925451 systemd[1]: Reached target nss-lookup.target. Feb 9 18:32:42.096327 augenrules[1314]: No rules Feb 9 18:32:42.095000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:32:42.095000 audit[1314]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd9b25040 a2=420 a3=0 items=0 ppid=1293 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:42.095000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:32:42.097367 systemd[1]: Finished audit-rules.service. Feb 9 18:32:42.190452 systemd-timesyncd[1298]: Contacted time server 198.71.50.75:123 (0.flatcar.pool.ntp.org). Feb 9 18:32:42.190876 systemd-timesyncd[1298]: Initial clock synchronization to Fri 2024-02-09 18:32:42.189707 UTC. Feb 9 18:32:47.657492 ldconfig[1278]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:32:47.670390 systemd[1]: Finished ldconfig.service. Feb 9 18:32:47.677221 systemd[1]: Starting systemd-update-done.service... Feb 9 18:32:47.724379 systemd[1]: Finished systemd-update-done.service. Feb 9 18:32:47.729532 systemd[1]: Reached target sysinit.target. Feb 9 18:32:47.734006 systemd[1]: Started motdgen.path. Feb 9 18:32:47.738075 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:32:47.744873 systemd[1]: Started logrotate.timer. Feb 9 18:32:47.749056 systemd[1]: Started mdadm.timer. Feb 9 18:32:47.752790 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:32:47.757601 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:32:47.757634 systemd[1]: Reached target paths.target. Feb 9 18:32:47.762169 systemd[1]: Reached target timers.target. Feb 9 18:32:47.767290 systemd[1]: Listening on dbus.socket. Feb 9 18:32:47.772500 systemd[1]: Starting docker.socket... Feb 9 18:32:47.798031 systemd[1]: Listening on sshd.socket. Feb 9 18:32:47.802326 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:47.802805 systemd[1]: Listening on docker.socket. Feb 9 18:32:47.806945 systemd[1]: Reached target sockets.target. Feb 9 18:32:47.811413 systemd[1]: Reached target basic.target. Feb 9 18:32:47.815575 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:32:47.815601 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:32:47.816642 systemd[1]: Starting containerd.service... Feb 9 18:32:47.821183 systemd[1]: Starting dbus.service... Feb 9 18:32:47.825734 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:32:47.831318 systemd[1]: Starting extend-filesystems.service... Feb 9 18:32:47.838403 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:32:47.839379 systemd[1]: Starting motdgen.service... Feb 9 18:32:47.843872 systemd[1]: Started nvidia.service. Feb 9 18:32:47.848801 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:32:47.854700 systemd[1]: Starting prepare-critools.service... Feb 9 18:32:47.859866 systemd[1]: Starting prepare-helm.service... Feb 9 18:32:47.865771 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:32:47.871292 systemd[1]: Starting sshd-keygen.service... Feb 9 18:32:47.878369 systemd[1]: Starting systemd-logind.service... Feb 9 18:32:47.882795 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:47.882857 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:32:47.883313 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:32:47.883987 systemd[1]: Starting update-engine.service... Feb 9 18:32:47.889160 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:32:47.900284 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:32:47.900835 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:32:47.916553 jq[1344]: true Feb 9 18:32:47.917046 jq[1324]: false Feb 9 18:32:47.932548 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:32:47.932721 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:32:47.942014 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:32:47.942174 systemd[1]: Finished motdgen.service. Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda1 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda2 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda3 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found usr Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda4 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda6 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda7 Feb 9 18:32:47.948986 extend-filesystems[1325]: Found sda9 Feb 9 18:32:47.948986 extend-filesystems[1325]: Checking size of /dev/sda9 Feb 9 18:32:48.004388 jq[1352]: true Feb 9 18:32:47.978542 systemd-logind[1341]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:32:48.020288 tar[1347]: crictl Feb 9 18:32:48.023639 tar[1348]: linux-arm64/helm Feb 9 18:32:48.023814 tar[1346]: ./ Feb 9 18:32:48.023814 tar[1346]: ./loopback Feb 9 18:32:47.978713 systemd-logind[1341]: New seat seat0. Feb 9 18:32:48.066187 env[1353]: time="2024-02-09T18:32:48.065974496Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:32:48.072532 extend-filesystems[1325]: Old size kept for /dev/sda9 Feb 9 18:32:48.072532 extend-filesystems[1325]: Found sr0 Feb 9 18:32:48.072538 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:32:48.072710 systemd[1]: Finished extend-filesystems.service. Feb 9 18:32:48.127045 bash[1389]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:32:48.127053 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:32:48.134806 dbus-daemon[1323]: [system] SELinux support is enabled Feb 9 18:32:48.134948 systemd[1]: Started dbus.service. Feb 9 18:32:48.151277 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:32:48.151311 systemd[1]: Reached target system-config.target. Feb 9 18:32:48.158411 tar[1346]: ./bandwidth Feb 9 18:32:48.159865 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:32:48.159888 systemd[1]: Reached target user-config.target. Feb 9 18:32:48.166015 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:32:48.167051 dbus-daemon[1323]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 18:32:48.167219 systemd[1]: Started systemd-logind.service. Feb 9 18:32:48.198832 env[1353]: time="2024-02-09T18:32:48.198787028Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:32:48.199583 env[1353]: time="2024-02-09T18:32:48.199561967Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.204887 env[1353]: time="2024-02-09T18:32:48.204854221Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:48.205052 env[1353]: time="2024-02-09T18:32:48.205035656Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.206396 env[1353]: time="2024-02-09T18:32:48.206371059Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:48.210753 env[1353]: time="2024-02-09T18:32:48.210729659Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.210844 env[1353]: time="2024-02-09T18:32:48.210828696Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:32:48.210909 env[1353]: time="2024-02-09T18:32:48.210895614Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.214014 env[1353]: time="2024-02-09T18:32:48.213988729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.214318 env[1353]: time="2024-02-09T18:32:48.214299560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:48.217678 env[1353]: time="2024-02-09T18:32:48.217651987Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:48.217758 env[1353]: time="2024-02-09T18:32:48.217744665Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:32:48.217875 env[1353]: time="2024-02-09T18:32:48.217859142Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:32:48.217943 env[1353]: time="2024-02-09T18:32:48.217930900Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:32:48.235581 env[1353]: time="2024-02-09T18:32:48.235535453Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:32:48.235581 env[1353]: time="2024-02-09T18:32:48.235581572Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:32:48.235719 env[1353]: time="2024-02-09T18:32:48.235597972Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:32:48.235719 env[1353]: time="2024-02-09T18:32:48.235634331Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.235719 env[1353]: time="2024-02-09T18:32:48.235650010Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.235719 env[1353]: time="2024-02-09T18:32:48.235663770Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.235719 env[1353]: time="2024-02-09T18:32:48.235677730Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236080 env[1353]: time="2024-02-09T18:32:48.236053519Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236080 env[1353]: time="2024-02-09T18:32:48.236080358Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236159 env[1353]: time="2024-02-09T18:32:48.236096278Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236159 env[1353]: time="2024-02-09T18:32:48.236108638Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236159 env[1353]: time="2024-02-09T18:32:48.236121597Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:32:48.236276 env[1353]: time="2024-02-09T18:32:48.236254194Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:32:48.236355 env[1353]: time="2024-02-09T18:32:48.236336191Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:32:48.236648 env[1353]: time="2024-02-09T18:32:48.236619344Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:32:48.236703 env[1353]: time="2024-02-09T18:32:48.236652823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236703 env[1353]: time="2024-02-09T18:32:48.236668422Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:32:48.236745 env[1353]: time="2024-02-09T18:32:48.236710781Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236745 env[1353]: time="2024-02-09T18:32:48.236723021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236745 env[1353]: time="2024-02-09T18:32:48.236734100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236802 env[1353]: time="2024-02-09T18:32:48.236745100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236802 env[1353]: time="2024-02-09T18:32:48.236756980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236802 env[1353]: time="2024-02-09T18:32:48.236774579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236802 env[1353]: time="2024-02-09T18:32:48.236785859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236802 env[1353]: time="2024-02-09T18:32:48.236797379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236931 env[1353]: time="2024-02-09T18:32:48.236811378Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:32:48.236956 env[1353]: time="2024-02-09T18:32:48.236930975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236956 env[1353]: time="2024-02-09T18:32:48.236946415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236997 env[1353]: time="2024-02-09T18:32:48.236960094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.236997 env[1353]: time="2024-02-09T18:32:48.236971934Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:32:48.236997 env[1353]: time="2024-02-09T18:32:48.236985813Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:32:48.236997 env[1353]: time="2024-02-09T18:32:48.236996173Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:32:48.237069 env[1353]: time="2024-02-09T18:32:48.237012853Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:32:48.237069 env[1353]: time="2024-02-09T18:32:48.237046812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:32:48.237325 env[1353]: time="2024-02-09T18:32:48.237237766Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.237328684Z" level=info msg="Connect containerd service" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.237360843Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.240128247Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.240432358Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.240471197Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247253770Z" level=info msg="Start subscribing containerd event" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247312168Z" level=info msg="Start recovering state" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247381126Z" level=info msg="Start event monitor" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247400486Z" level=info msg="Start snapshots syncer" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247410886Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:32:48.254533 env[1353]: time="2024-02-09T18:32:48.247419685Z" level=info msg="Start streaming server" Feb 9 18:32:48.240618 systemd[1]: Started containerd.service. Feb 9 18:32:48.258415 env[1353]: time="2024-02-09T18:32:48.258383143Z" level=info msg="containerd successfully booted in 0.194414s" Feb 9 18:32:48.289632 tar[1346]: ./ptp Feb 9 18:32:48.372762 tar[1346]: ./vlan Feb 9 18:32:48.438052 tar[1346]: ./host-device Feb 9 18:32:48.506313 tar[1346]: ./tuning Feb 9 18:32:48.564659 tar[1346]: ./vrf Feb 9 18:32:48.623975 tar[1346]: ./sbr Feb 9 18:32:48.651153 update_engine[1343]: I0209 18:32:48.637447 1343 main.cc:92] Flatcar Update Engine starting Feb 9 18:32:48.684004 tar[1346]: ./tap Feb 9 18:32:48.700809 systemd[1]: Started update-engine.service. Feb 9 18:32:48.701213 update_engine[1343]: I0209 18:32:48.700850 1343 update_check_scheduler.cc:74] Next update check in 6m30s Feb 9 18:32:48.708237 systemd[1]: Started locksmithd.service. Feb 9 18:32:48.761900 tar[1346]: ./dhcp Feb 9 18:32:48.894244 tar[1348]: linux-arm64/LICENSE Feb 9 18:32:48.894454 tar[1348]: linux-arm64/README.md Feb 9 18:32:48.899543 systemd[1]: Finished prepare-helm.service. Feb 9 18:32:48.912443 tar[1346]: ./static Feb 9 18:32:48.937043 tar[1346]: ./firewall Feb 9 18:32:48.955882 systemd[1]: Finished prepare-critools.service. Feb 9 18:32:48.981502 tar[1346]: ./macvlan Feb 9 18:32:49.014765 tar[1346]: ./dummy Feb 9 18:32:49.047654 tar[1346]: ./bridge Feb 9 18:32:49.083668 tar[1346]: ./ipvlan Feb 9 18:32:49.116518 tar[1346]: ./portmap Feb 9 18:32:49.147872 tar[1346]: ./host-local Feb 9 18:32:49.234814 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:32:49.817638 sshd_keygen[1342]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:32:49.834440 systemd[1]: Finished sshd-keygen.service. Feb 9 18:32:49.840856 systemd[1]: Starting issuegen.service... Feb 9 18:32:49.846042 systemd[1]: Started waagent.service. Feb 9 18:32:49.850823 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:32:49.850979 systemd[1]: Finished issuegen.service. Feb 9 18:32:49.856709 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:32:49.897605 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:32:49.904377 systemd[1]: Started getty@tty1.service. Feb 9 18:32:49.910253 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:32:49.915354 systemd[1]: Reached target getty.target. Feb 9 18:32:49.919820 systemd[1]: Reached target multi-user.target. Feb 9 18:32:49.926587 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:32:49.935389 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:32:49.935582 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:32:49.941409 systemd[1]: Startup finished in 743ms (kernel) + 22.251s (initrd) + 31.451s (userspace) = 54.445s. Feb 9 18:32:50.442656 locksmithd[1432]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:32:50.729740 login[1455]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 18:32:50.760512 login[1454]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:32:50.797895 systemd[1]: Created slice user-500.slice. Feb 9 18:32:50.799027 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:32:50.801377 systemd-logind[1341]: New session 1 of user core. Feb 9 18:32:50.836211 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:32:50.837817 systemd[1]: Starting user@500.service... Feb 9 18:32:50.856021 (systemd)[1458]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:32:51.090967 systemd[1458]: Queued start job for default target default.target. Feb 9 18:32:51.091532 systemd[1458]: Reached target paths.target. Feb 9 18:32:51.091552 systemd[1458]: Reached target sockets.target. Feb 9 18:32:51.091563 systemd[1458]: Reached target timers.target. Feb 9 18:32:51.091573 systemd[1458]: Reached target basic.target. Feb 9 18:32:51.091617 systemd[1458]: Reached target default.target. Feb 9 18:32:51.091641 systemd[1458]: Startup finished in 229ms. Feb 9 18:32:51.091693 systemd[1]: Started user@500.service. Feb 9 18:32:51.092599 systemd[1]: Started session-1.scope. Feb 9 18:32:51.731469 login[1455]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:32:51.735652 systemd-logind[1341]: New session 2 of user core. Feb 9 18:32:51.736044 systemd[1]: Started session-2.scope. Feb 9 18:32:56.062027 waagent[1452]: 2024-02-09T18:32:56.061911Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 18:32:56.069018 waagent[1452]: 2024-02-09T18:32:56.068923Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 18:32:56.073786 waagent[1452]: 2024-02-09T18:32:56.073716Z INFO Daemon Daemon Python: 3.9.16 Feb 9 18:32:56.078727 waagent[1452]: 2024-02-09T18:32:56.078652Z INFO Daemon Daemon Run daemon Feb 9 18:32:56.083202 waagent[1452]: 2024-02-09T18:32:56.083141Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 18:32:56.100807 waagent[1452]: 2024-02-09T18:32:56.100667Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:32:56.116592 waagent[1452]: 2024-02-09T18:32:56.116418Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:32:56.127001 waagent[1452]: 2024-02-09T18:32:56.126916Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:32:56.132326 waagent[1452]: 2024-02-09T18:32:56.132253Z INFO Daemon Daemon Using waagent for provisioning Feb 9 18:32:56.138234 waagent[1452]: 2024-02-09T18:32:56.138166Z INFO Daemon Daemon Activate resource disk Feb 9 18:32:56.144264 waagent[1452]: 2024-02-09T18:32:56.144194Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 18:32:56.158818 waagent[1452]: 2024-02-09T18:32:56.158750Z INFO Daemon Daemon Found device: None Feb 9 18:32:56.163538 waagent[1452]: 2024-02-09T18:32:56.163453Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 18:32:56.172241 waagent[1452]: 2024-02-09T18:32:56.172177Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 18:32:56.184645 waagent[1452]: 2024-02-09T18:32:56.184579Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:32:56.190818 waagent[1452]: 2024-02-09T18:32:56.190758Z INFO Daemon Daemon Running default provisioning handler Feb 9 18:32:56.204225 waagent[1452]: 2024-02-09T18:32:56.204082Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:32:56.219813 waagent[1452]: 2024-02-09T18:32:56.219682Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:32:56.230086 waagent[1452]: 2024-02-09T18:32:56.230020Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:32:56.235330 waagent[1452]: 2024-02-09T18:32:56.235269Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 18:32:56.328935 waagent[1452]: 2024-02-09T18:32:56.328738Z INFO Daemon Daemon Successfully mounted dvd Feb 9 18:32:56.415604 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 18:32:56.442009 waagent[1452]: 2024-02-09T18:32:56.441809Z INFO Daemon Daemon Detect protocol endpoint Feb 9 18:32:56.447459 waagent[1452]: 2024-02-09T18:32:56.447380Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:32:56.453627 waagent[1452]: 2024-02-09T18:32:56.453563Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 18:32:56.460661 waagent[1452]: 2024-02-09T18:32:56.460597Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 18:32:56.466448 waagent[1452]: 2024-02-09T18:32:56.466388Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 18:32:56.472022 waagent[1452]: 2024-02-09T18:32:56.471961Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 18:32:56.551914 waagent[1452]: 2024-02-09T18:32:56.551847Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 18:32:56.559357 waagent[1452]: 2024-02-09T18:32:56.559312Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 18:32:56.565087 waagent[1452]: 2024-02-09T18:32:56.565025Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 18:32:57.711179 waagent[1452]: 2024-02-09T18:32:57.711031Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 18:32:57.735422 waagent[1452]: 2024-02-09T18:32:57.735347Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 18:32:57.741462 waagent[1452]: 2024-02-09T18:32:57.741400Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 18:32:57.811603 waagent[1452]: 2024-02-09T18:32:57.811461Z INFO Daemon Daemon Found private key matching thumbprint 0D9BF437DDEDD4ADD1D2331CF8A120D853028092 Feb 9 18:32:57.820515 waagent[1452]: 2024-02-09T18:32:57.820433Z INFO Daemon Daemon Certificate with thumbprint 44389390C33E5ADBB9E2B197918B16FAD3636C2F has no matching private key. Feb 9 18:32:57.830372 waagent[1452]: 2024-02-09T18:32:57.830309Z INFO Daemon Daemon Fetch goal state completed Feb 9 18:32:57.854151 waagent[1452]: 2024-02-09T18:32:57.854102Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2d91b482-c64b-4557-83da-fab86703492d New eTag: 7723374286996118232] Feb 9 18:32:57.865256 waagent[1452]: 2024-02-09T18:32:57.865194Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:32:57.880575 waagent[1452]: 2024-02-09T18:32:57.880498Z INFO Daemon Daemon Starting provisioning Feb 9 18:32:57.885923 waagent[1452]: 2024-02-09T18:32:57.885861Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 18:32:57.891135 waagent[1452]: 2024-02-09T18:32:57.891076Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-9ade464be9] Feb 9 18:32:57.938879 waagent[1452]: 2024-02-09T18:32:57.938754Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-9ade464be9] Feb 9 18:32:57.945523 waagent[1452]: 2024-02-09T18:32:57.945433Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 18:32:57.952077 waagent[1452]: 2024-02-09T18:32:57.952016Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 18:32:57.968334 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 18:32:57.968510 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 18:32:57.968569 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 18:32:57.968796 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:32:57.972550 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 18:32:57.974634 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:32:57.974822 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:32:57.977014 systemd[1]: Starting systemd-networkd.service... Feb 9 18:32:58.003718 systemd-networkd[1506]: enP31589s1: Link UP Feb 9 18:32:58.003729 systemd-networkd[1506]: enP31589s1: Gained carrier Feb 9 18:32:58.004582 systemd-networkd[1506]: eth0: Link UP Feb 9 18:32:58.004592 systemd-networkd[1506]: eth0: Gained carrier Feb 9 18:32:58.004890 systemd-networkd[1506]: lo: Link UP Feb 9 18:32:58.004899 systemd-networkd[1506]: lo: Gained carrier Feb 9 18:32:58.005121 systemd-networkd[1506]: eth0: Gained IPv6LL Feb 9 18:32:58.006326 systemd-networkd[1506]: Enumeration completed Feb 9 18:32:58.006427 systemd[1]: Started systemd-networkd.service. Feb 9 18:32:58.008011 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:32:58.008055 systemd-networkd[1506]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:32:58.011718 waagent[1452]: 2024-02-09T18:32:58.011548Z INFO Daemon Daemon Create user account if not exists Feb 9 18:32:58.018448 waagent[1452]: 2024-02-09T18:32:58.018337Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 18:32:58.024828 waagent[1452]: 2024-02-09T18:32:58.024757Z INFO Daemon Daemon Configure sudoer Feb 9 18:32:58.030395 waagent[1452]: 2024-02-09T18:32:58.030331Z INFO Daemon Daemon Configure sshd Feb 9 18:32:58.034855 waagent[1452]: 2024-02-09T18:32:58.034794Z INFO Daemon Daemon Deploy ssh public key. Feb 9 18:32:58.035534 systemd-networkd[1506]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:32:58.040327 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:32:59.231214 waagent[1452]: 2024-02-09T18:32:59.231122Z INFO Daemon Daemon Provisioning complete Feb 9 18:32:59.252733 waagent[1452]: 2024-02-09T18:32:59.252665Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 18:32:59.259267 waagent[1452]: 2024-02-09T18:32:59.259201Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 18:32:59.270644 waagent[1452]: 2024-02-09T18:32:59.270572Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 18:32:59.569002 waagent[1515]: 2024-02-09T18:32:59.568861Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 18:32:59.570064 waagent[1515]: 2024-02-09T18:32:59.570007Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:59.570303 waagent[1515]: 2024-02-09T18:32:59.570253Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:59.584148 waagent[1515]: 2024-02-09T18:32:59.584079Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 18:32:59.584407 waagent[1515]: 2024-02-09T18:32:59.584356Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 18:32:59.653617 waagent[1515]: 2024-02-09T18:32:59.653460Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0D9BF437DDEDD4ADD1D2331CF8A120D853028092 Feb 9 18:32:59.653979 waagent[1515]: 2024-02-09T18:32:59.653924Z INFO ExtHandler ExtHandler Certificate with thumbprint 44389390C33E5ADBB9E2B197918B16FAD3636C2F has no matching private key. Feb 9 18:32:59.654313 waagent[1515]: 2024-02-09T18:32:59.654262Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 18:32:59.667324 waagent[1515]: 2024-02-09T18:32:59.667269Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: fdcf4476-0842-434d-a8e7-ee9a8a4bf894 New eTag: 7723374286996118232] Feb 9 18:32:59.668105 waagent[1515]: 2024-02-09T18:32:59.668044Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:32:59.745782 waagent[1515]: 2024-02-09T18:32:59.745651Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:32:59.768815 waagent[1515]: 2024-02-09T18:32:59.768738Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1515 Feb 9 18:32:59.772704 waagent[1515]: 2024-02-09T18:32:59.772640Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:32:59.774140 waagent[1515]: 2024-02-09T18:32:59.774081Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:32:59.952842 waagent[1515]: 2024-02-09T18:32:59.952786Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:32:59.953383 waagent[1515]: 2024-02-09T18:32:59.953325Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:32:59.961697 waagent[1515]: 2024-02-09T18:32:59.961643Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:32:59.962289 waagent[1515]: 2024-02-09T18:32:59.962233Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:32:59.963571 waagent[1515]: 2024-02-09T18:32:59.963504Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 18:32:59.965057 waagent[1515]: 2024-02-09T18:32:59.964986Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:32:59.965307 waagent[1515]: 2024-02-09T18:32:59.965235Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:59.965912 waagent[1515]: 2024-02-09T18:32:59.965848Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:59.966461 waagent[1515]: 2024-02-09T18:32:59.966403Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:32:59.966772 waagent[1515]: 2024-02-09T18:32:59.966716Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:32:59.966772 waagent[1515]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:32:59.966772 waagent[1515]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:32:59.966772 waagent[1515]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:32:59.966772 waagent[1515]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:59.966772 waagent[1515]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:59.966772 waagent[1515]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:59.968785 waagent[1515]: 2024-02-09T18:32:59.968629Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:32:59.969101 waagent[1515]: 2024-02-09T18:32:59.969026Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:59.969915 waagent[1515]: 2024-02-09T18:32:59.969848Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:59.970471 waagent[1515]: 2024-02-09T18:32:59.970405Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:32:59.970635 waagent[1515]: 2024-02-09T18:32:59.970585Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:32:59.970750 waagent[1515]: 2024-02-09T18:32:59.970708Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:32:59.971583 waagent[1515]: 2024-02-09T18:32:59.971520Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:32:59.971749 waagent[1515]: 2024-02-09T18:32:59.971670Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:32:59.972457 waagent[1515]: 2024-02-09T18:32:59.972383Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:32:59.972671 waagent[1515]: 2024-02-09T18:32:59.972591Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:32:59.972919 waagent[1515]: 2024-02-09T18:32:59.972860Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:33:00.010676 waagent[1515]: 2024-02-09T18:33:00.010549Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1506' Feb 9 18:33:00.110406 waagent[1515]: 2024-02-09T18:33:00.110264Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:33:00.110406 waagent[1515]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:33:00.110406 waagent[1515]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:33:00.110406 waagent[1515]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:43:fd brd ff:ff:ff:ff:ff:ff Feb 9 18:33:00.110406 waagent[1515]: 3: enP31589s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:43:fd brd ff:ff:ff:ff:ff:ff\ altname enP31589p0s2 Feb 9 18:33:00.110406 waagent[1515]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:33:00.110406 waagent[1515]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:33:00.110406 waagent[1515]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:33:00.110406 waagent[1515]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:33:00.110406 waagent[1515]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:33:00.110406 waagent[1515]: 2: eth0 inet6 fe80::20d:3aff:fefc:43fd/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:33:00.452843 waagent[1515]: 2024-02-09T18:33:00.452719Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 18:33:00.456081 waagent[1515]: 2024-02-09T18:33:00.455979Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 18:33:00.456081 waagent[1515]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:00.456081 waagent[1515]: pkts bytes target prot opt in out source destination Feb 9 18:33:00.456081 waagent[1515]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:00.456081 waagent[1515]: pkts bytes target prot opt in out source destination Feb 9 18:33:00.456081 waagent[1515]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:00.456081 waagent[1515]: pkts bytes target prot opt in out source destination Feb 9 18:33:00.456081 waagent[1515]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:33:00.456081 waagent[1515]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:33:00.457777 waagent[1515]: 2024-02-09T18:33:00.457726Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 18:33:00.780178 waagent[1515]: 2024-02-09T18:33:00.780062Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 18:33:00.781278 waagent[1515]: 2024-02-09T18:33:00.781228Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:33:00.782349 waagent[1515]: 2024-02-09T18:33:00.782291Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 18:33:00.809040 waagent[1515]: 2024-02-09T18:33:00.808970Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 18:33:00.981296 waagent[1515]: 2024-02-09T18:33:00.981232Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 18:33:01.275465 waagent[1452]: 2024-02-09T18:33:01.275328Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 18:33:01.279200 waagent[1452]: 2024-02-09T18:33:01.279146Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 18:33:02.444041 waagent[1555]: 2024-02-09T18:33:02.443943Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 18:33:02.445057 waagent[1555]: 2024-02-09T18:33:02.444998Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 18:33:02.445299 waagent[1555]: 2024-02-09T18:33:02.445250Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 18:33:02.453692 waagent[1555]: 2024-02-09T18:33:02.453588Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:33:02.454253 waagent[1555]: 2024-02-09T18:33:02.454197Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:33:02.454542 waagent[1555]: 2024-02-09T18:33:02.454456Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:33:02.467255 waagent[1555]: 2024-02-09T18:33:02.467185Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 18:33:02.479665 waagent[1555]: 2024-02-09T18:33:02.479610Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 18:33:02.480804 waagent[1555]: 2024-02-09T18:33:02.480744Z INFO ExtHandler Feb 9 18:33:02.481058 waagent[1555]: 2024-02-09T18:33:02.481008Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 907696c7-8168-4b88-83d6-72e56b3bf448 eTag: 7723374286996118232 source: Fabric] Feb 9 18:33:02.481931 waagent[1555]: 2024-02-09T18:33:02.481870Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 18:33:02.483295 waagent[1555]: 2024-02-09T18:33:02.483233Z INFO ExtHandler Feb 9 18:33:02.483579 waagent[1555]: 2024-02-09T18:33:02.483524Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 18:33:02.489781 waagent[1555]: 2024-02-09T18:33:02.489732Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 18:33:02.490361 waagent[1555]: 2024-02-09T18:33:02.490312Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:33:02.516015 waagent[1555]: 2024-02-09T18:33:02.515954Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 18:33:02.586970 waagent[1555]: 2024-02-09T18:33:02.586837Z INFO ExtHandler Downloaded certificate {'thumbprint': '44389390C33E5ADBB9E2B197918B16FAD3636C2F', 'hasPrivateKey': False} Feb 9 18:33:02.588231 waagent[1555]: 2024-02-09T18:33:02.588170Z INFO ExtHandler Downloaded certificate {'thumbprint': '0D9BF437DDEDD4ADD1D2331CF8A120D853028092', 'hasPrivateKey': True} Feb 9 18:33:02.589430 waagent[1555]: 2024-02-09T18:33:02.589371Z INFO ExtHandler Fetch goal state completed Feb 9 18:33:02.616566 waagent[1555]: 2024-02-09T18:33:02.616492Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1555 Feb 9 18:33:02.620226 waagent[1555]: 2024-02-09T18:33:02.620165Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:33:02.621813 waagent[1555]: 2024-02-09T18:33:02.621753Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:33:02.627298 waagent[1555]: 2024-02-09T18:33:02.627249Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:33:02.627844 waagent[1555]: 2024-02-09T18:33:02.627786Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:33:02.635936 waagent[1555]: 2024-02-09T18:33:02.635876Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:33:02.636408 waagent[1555]: 2024-02-09T18:33:02.636352Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:33:02.681590 waagent[1555]: 2024-02-09T18:33:02.681434Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 18:33:02.684706 waagent[1555]: 2024-02-09T18:33:02.684592Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 18:33:02.688443 waagent[1555]: 2024-02-09T18:33:02.688381Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 18:33:02.690040 waagent[1555]: 2024-02-09T18:33:02.689968Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:33:02.690756 waagent[1555]: 2024-02-09T18:33:02.690696Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:33:02.691008 waagent[1555]: 2024-02-09T18:33:02.690959Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:33:02.691711 waagent[1555]: 2024-02-09T18:33:02.691642Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:33:02.692115 waagent[1555]: 2024-02-09T18:33:02.692047Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:33:02.692998 waagent[1555]: 2024-02-09T18:33:02.692931Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:33:02.692998 waagent[1555]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:33:02.692998 waagent[1555]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:33:02.692998 waagent[1555]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:33:02.692998 waagent[1555]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:33:02.692998 waagent[1555]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:33:02.692998 waagent[1555]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:33:02.693172 waagent[1555]: 2024-02-09T18:33:02.693021Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:33:02.693231 waagent[1555]: 2024-02-09T18:33:02.693179Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:33:02.693678 waagent[1555]: 2024-02-09T18:33:02.693616Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:33:02.693997 waagent[1555]: 2024-02-09T18:33:02.693819Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:33:02.694435 waagent[1555]: 2024-02-09T18:33:02.694328Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:33:02.694719 waagent[1555]: 2024-02-09T18:33:02.694658Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:33:02.696944 waagent[1555]: 2024-02-09T18:33:02.696792Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:33:02.697361 waagent[1555]: 2024-02-09T18:33:02.697264Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:33:02.697936 waagent[1555]: 2024-02-09T18:33:02.697851Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:33:02.698451 waagent[1555]: 2024-02-09T18:33:02.698387Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:33:02.728639 waagent[1555]: 2024-02-09T18:33:02.728563Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 18:33:02.731020 waagent[1555]: 2024-02-09T18:33:02.730870Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 18:33:02.732421 waagent[1555]: 2024-02-09T18:33:02.732344Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:33:02.732421 waagent[1555]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:33:02.732421 waagent[1555]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:33:02.732421 waagent[1555]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:43:fd brd ff:ff:ff:ff:ff:ff Feb 9 18:33:02.732421 waagent[1555]: 3: enP31589s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fc:43:fd brd ff:ff:ff:ff:ff:ff\ altname enP31589p0s2 Feb 9 18:33:02.732421 waagent[1555]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:33:02.732421 waagent[1555]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:33:02.732421 waagent[1555]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:33:02.732421 waagent[1555]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:33:02.732421 waagent[1555]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:33:02.732421 waagent[1555]: 2: eth0 inet6 fe80::20d:3aff:fefc:43fd/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:33:02.759291 waagent[1555]: 2024-02-09T18:33:02.759219Z INFO ExtHandler ExtHandler Feb 9 18:33:02.759637 waagent[1555]: 2024-02-09T18:33:02.759566Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 08e83e5f-82ef-4bbd-8ff2-8f49d46e45c0 correlation 080e4711-5690-43bf-8b1e-ada80c538535 created: 2024-02-09T18:31:11.223389Z] Feb 9 18:33:02.760805 waagent[1555]: 2024-02-09T18:33:02.760733Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 18:33:02.762934 waagent[1555]: 2024-02-09T18:33:02.762874Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 18:33:02.785953 waagent[1555]: 2024-02-09T18:33:02.785890Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 18:33:02.803621 waagent[1555]: 2024-02-09T18:33:02.803548Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: CDD1827A-6C0F-4C36-9134-FC39E7D0962B;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 18:33:02.820295 waagent[1555]: 2024-02-09T18:33:02.820153Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 18:33:02.820295 waagent[1555]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:02.820295 waagent[1555]: pkts bytes target prot opt in out source destination Feb 9 18:33:02.820295 waagent[1555]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:02.820295 waagent[1555]: pkts bytes target prot opt in out source destination Feb 9 18:33:02.820295 waagent[1555]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:33:02.820295 waagent[1555]: pkts bytes target prot opt in out source destination Feb 9 18:33:02.820295 waagent[1555]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:33:02.820295 waagent[1555]: 5 467 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:33:02.820295 waagent[1555]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:33:27.027319 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 18:33:33.531350 update_engine[1343]: I0209 18:33:33.531293 1343 update_attempter.cc:509] Updating boot flags... Feb 9 18:33:48.736457 systemd[1]: Created slice system-sshd.slice. Feb 9 18:33:48.737595 systemd[1]: Started sshd@0-10.200.20.4:22-10.200.12.6:38250.service. Feb 9 18:33:49.347861 sshd[1663]: Accepted publickey for core from 10.200.12.6 port 38250 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:49.364099 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:49.368973 systemd[1]: Started session-3.scope. Feb 9 18:33:49.369517 systemd-logind[1341]: New session 3 of user core. Feb 9 18:33:49.724799 systemd[1]: Started sshd@1-10.200.20.4:22-10.200.12.6:38252.service. Feb 9 18:33:50.127837 sshd[1668]: Accepted publickey for core from 10.200.12.6 port 38252 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:50.129109 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:50.133296 systemd[1]: Started session-4.scope. Feb 9 18:33:50.133633 systemd-logind[1341]: New session 4 of user core. Feb 9 18:33:50.419533 sshd[1668]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:50.422173 systemd[1]: sshd@1-10.200.20.4:22-10.200.12.6:38252.service: Deactivated successfully. Feb 9 18:33:50.422878 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:33:50.423405 systemd-logind[1341]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:33:50.424221 systemd-logind[1341]: Removed session 4. Feb 9 18:33:50.485818 systemd[1]: Started sshd@2-10.200.20.4:22-10.200.12.6:38268.service. Feb 9 18:33:50.886108 sshd[1674]: Accepted publickey for core from 10.200.12.6 port 38268 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:50.887678 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:50.891717 systemd[1]: Started session-5.scope. Feb 9 18:33:50.892265 systemd-logind[1341]: New session 5 of user core. Feb 9 18:33:51.174084 sshd[1674]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:51.176946 systemd[1]: sshd@2-10.200.20.4:22-10.200.12.6:38268.service: Deactivated successfully. Feb 9 18:33:51.177638 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:33:51.178145 systemd-logind[1341]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:33:51.178885 systemd-logind[1341]: Removed session 5. Feb 9 18:33:51.246474 systemd[1]: Started sshd@3-10.200.20.4:22-10.200.12.6:38276.service. Feb 9 18:33:51.682637 sshd[1680]: Accepted publickey for core from 10.200.12.6 port 38276 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:51.684183 sshd[1680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:51.687776 systemd-logind[1341]: New session 6 of user core. Feb 9 18:33:51.688195 systemd[1]: Started session-6.scope. Feb 9 18:33:51.998451 sshd[1680]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:52.000720 systemd[1]: sshd@3-10.200.20.4:22-10.200.12.6:38276.service: Deactivated successfully. Feb 9 18:33:52.001372 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:33:52.001906 systemd-logind[1341]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:33:52.002745 systemd-logind[1341]: Removed session 6. Feb 9 18:33:52.064735 systemd[1]: Started sshd@4-10.200.20.4:22-10.200.12.6:38290.service. Feb 9 18:33:52.465288 sshd[1686]: Accepted publickey for core from 10.200.12.6 port 38290 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:52.466619 sshd[1686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:52.470375 systemd-logind[1341]: New session 7 of user core. Feb 9 18:33:52.470824 systemd[1]: Started session-7.scope. Feb 9 18:33:52.969992 sudo[1689]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:33:52.970184 sudo[1689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:52.998686 dbus-daemon[1323]: avc: received setenforce notice (enforcing=1) Feb 9 18:33:53.000589 sudo[1689]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:53.077620 sshd[1686]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:53.080254 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:33:53.080861 systemd-logind[1341]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:33:53.081002 systemd[1]: sshd@4-10.200.20.4:22-10.200.12.6:38290.service: Deactivated successfully. Feb 9 18:33:53.082255 systemd-logind[1341]: Removed session 7. Feb 9 18:33:53.150193 systemd[1]: Started sshd@5-10.200.20.4:22-10.200.12.6:38298.service. Feb 9 18:33:53.587935 sshd[1693]: Accepted publickey for core from 10.200.12.6 port 38298 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:53.589565 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:53.593191 systemd-logind[1341]: New session 8 of user core. Feb 9 18:33:53.593629 systemd[1]: Started session-8.scope. Feb 9 18:33:53.836098 sudo[1697]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:33:53.836599 sudo[1697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:53.839257 sudo[1697]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:53.843361 sudo[1696]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:33:53.843574 sudo[1696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:53.851299 systemd[1]: Stopping audit-rules.service... Feb 9 18:33:53.850000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:33:53.856168 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 18:33:53.856221 kernel: audit: type=1305 audit(1707503633.850:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:33:53.850000 audit[1700]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe0095d10 a2=420 a3=0 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.866830 auditctl[1700]: No rules Feb 9 18:33:53.871908 kernel: audit: type=1300 audit(1707503633.850:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe0095d10 a2=420 a3=0 items=0 ppid=1 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.867300 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:33:53.867468 systemd[1]: Stopped audit-rules.service. Feb 9 18:33:53.869159 systemd[1]: Starting audit-rules.service... Feb 9 18:33:53.850000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:33:53.897201 kernel: audit: type=1327 audit(1707503633.850:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:33:53.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.913388 kernel: audit: type=1131 audit(1707503633.866:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.920977 augenrules[1717]: No rules Feb 9 18:33:53.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.921850 systemd[1]: Finished audit-rules.service. Feb 9 18:33:53.924703 sudo[1696]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:53.923000 audit[1696]: USER_END pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.958488 kernel: audit: type=1130 audit(1707503633.920:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.958566 kernel: audit: type=1106 audit(1707503633.923:174): pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.958621 kernel: audit: type=1104 audit(1707503633.923:175): pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:53.923000 audit[1696]: CRED_DISP pid=1696 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.007323 sshd[1693]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:54.006000 audit[1693]: USER_END pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.009927 systemd[1]: sshd@5-10.200.20.4:22-10.200.12.6:38298.service: Deactivated successfully. Feb 9 18:33:54.010636 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 18:33:54.012035 systemd-logind[1341]: Session 8 logged out. Waiting for processes to exit. Feb 9 18:33:54.012880 systemd-logind[1341]: Removed session 8. Feb 9 18:33:54.006000 audit[1693]: CRED_DISP pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.049345 kernel: audit: type=1106 audit(1707503634.006:176): pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.049404 kernel: audit: type=1104 audit(1707503634.006:177): pid=1693 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.049434 kernel: audit: type=1131 audit(1707503634.006:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.12.6:38298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.12.6:38298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.096898 systemd[1]: Started sshd@6-10.200.20.4:22-10.200.12.6:38300.service. Feb 9 18:33:54.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.494000 audit[1723]: USER_ACCT pid=1723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.496286 sshd[1723]: Accepted publickey for core from 10.200.12.6 port 38300 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:54.496000 audit[1723]: CRED_ACQ pid=1723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.496000 audit[1723]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8fc7f10 a2=3 a3=1 items=0 ppid=1 pid=1723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:54.496000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:33:54.497902 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:54.501962 systemd[1]: Started session-9.scope. Feb 9 18:33:54.502522 systemd-logind[1341]: New session 9 of user core. Feb 9 18:33:54.505000 audit[1723]: USER_START pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.506000 audit[1725]: CRED_ACQ pid=1725 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:54.724000 audit[1726]: USER_ACCT pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.725763 sudo[1726]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:33:54.724000 audit[1726]: CRED_REFR pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:54.725963 sudo[1726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:54.725000 audit[1726]: USER_START pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:55.385005 systemd[1]: Starting docker.service... Feb 9 18:33:55.432618 env[1741]: time="2024-02-09T18:33:55.432564151Z" level=info msg="Starting up" Feb 9 18:33:55.433906 env[1741]: time="2024-02-09T18:33:55.433881850Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:33:55.433991 env[1741]: time="2024-02-09T18:33:55.433974772Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:33:55.434067 env[1741]: time="2024-02-09T18:33:55.434051813Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:33:55.434125 env[1741]: time="2024-02-09T18:33:55.434110334Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:33:55.442965 env[1741]: time="2024-02-09T18:33:55.442939507Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:33:55.443063 env[1741]: time="2024-02-09T18:33:55.443049429Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:33:55.443124 env[1741]: time="2024-02-09T18:33:55.443110910Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:33:55.443174 env[1741]: time="2024-02-09T18:33:55.443163671Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:33:55.450221 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4029949323-merged.mount: Deactivated successfully. Feb 9 18:33:55.551274 env[1741]: time="2024-02-09T18:33:55.551221105Z" level=info msg="Loading containers: start." Feb 9 18:33:55.617000 audit[1768]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.617000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffaf73a70 a2=0 a3=1 items=0 ppid=1741 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 18:33:55.618000 audit[1770]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.618000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff00abbe0 a2=0 a3=1 items=0 ppid=1741 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 18:33:55.620000 audit[1772]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.620000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc1c06d60 a2=0 a3=1 items=0 ppid=1741 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:33:55.622000 audit[1774]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.622000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd8f9a7d0 a2=0 a3=1 items=0 ppid=1741 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.622000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:33:55.623000 audit[1776]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.623000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd28f0cb0 a2=0 a3=1 items=0 ppid=1741 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 18:33:55.625000 audit[1778]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.625000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe71f0990 a2=0 a3=1 items=0 ppid=1741 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 18:33:55.640000 audit[1780]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.640000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd22e5d0 a2=0 a3=1 items=0 ppid=1741 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 18:33:55.642000 audit[1782]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.642000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff6677ff0 a2=0 a3=1 items=0 ppid=1741 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 18:33:55.644000 audit[1784]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.644000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff5dc1480 a2=0 a3=1 items=0 ppid=1741 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:55.657000 audit[1788]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.657000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0386310 a2=0 a3=1 items=0 ppid=1741 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:55.658000 audit[1789]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.658000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdf2349d0 a2=0 a3=1 items=0 ppid=1741 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:55.708502 kernel: Initializing XFRM netlink socket Feb 9 18:33:55.761370 env[1741]: time="2024-02-09T18:33:55.761323561Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 18:33:55.852000 audit[1797]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.852000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc443e5d0 a2=0 a3=1 items=0 ppid=1741 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.852000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 18:33:55.860000 audit[1800]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.860000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffecc378c0 a2=0 a3=1 items=0 ppid=1741 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.860000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 18:33:55.863000 audit[1803]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.863000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcbdafae0 a2=0 a3=1 items=0 ppid=1741 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.863000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 18:33:55.865000 audit[1805]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.865000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffee2a2d30 a2=0 a3=1 items=0 ppid=1741 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 18:33:55.866000 audit[1807]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.866000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffebcbe010 a2=0 a3=1 items=0 ppid=1741 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 18:33:55.868000 audit[1809]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.868000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffedf61ce0 a2=0 a3=1 items=0 ppid=1741 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 18:33:55.870000 audit[1811]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.870000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcdbe4410 a2=0 a3=1 items=0 ppid=1741 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 18:33:55.871000 audit[1813]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.871000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdc5636f0 a2=0 a3=1 items=0 ppid=1741 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 18:33:55.873000 audit[1815]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.873000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc9532720 a2=0 a3=1 items=0 ppid=1741 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:33:55.875000 audit[1817]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.875000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe289d4a0 a2=0 a3=1 items=0 ppid=1741 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:33:55.876000 audit[1819]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.876000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe49ffb30 a2=0 a3=1 items=0 ppid=1741 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 18:33:55.878655 systemd-networkd[1506]: docker0: Link UP Feb 9 18:33:55.892000 audit[1823]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.892000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0e36e70 a2=0 a3=1 items=0 ppid=1741 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:55.895640 env[1741]: time="2024-02-09T18:33:55.895610871Z" level=info msg="Loading containers: done." Feb 9 18:33:55.893000 audit[1824]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:55.893000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd0cfcf10 a2=0 a3=1 items=0 ppid=1741 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:55.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:55.906409 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3564064825-merged.mount: Deactivated successfully. Feb 9 18:33:55.929040 env[1741]: time="2024-02-09T18:33:55.928979256Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 18:33:55.929386 env[1741]: time="2024-02-09T18:33:55.929368982Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 18:33:55.929581 env[1741]: time="2024-02-09T18:33:55.929566465Z" level=info msg="Daemon has completed initialization" Feb 9 18:33:55.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:55.957452 systemd[1]: Started docker.service. Feb 9 18:33:55.963381 env[1741]: time="2024-02-09T18:33:55.963311055Z" level=info msg="API listen on /run/docker.sock" Feb 9 18:33:55.981602 systemd[1]: Reloading. Feb 9 18:33:56.038916 /usr/lib/systemd/system-generators/torcx-generator[1870]: time="2024-02-09T18:33:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:33:56.039256 /usr/lib/systemd/system-generators/torcx-generator[1870]: time="2024-02-09T18:33:56Z" level=info msg="torcx already run" Feb 9 18:33:56.106239 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:33:56.106257 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:33:56.121220 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit: BPF prog-id=35 op=LOAD Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit: BPF prog-id=36 op=LOAD Feb 9 18:33:56.187000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:33:56.187000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit: BPF prog-id=37 op=LOAD Feb 9 18:33:56.187000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.187000 audit: BPF prog-id=38 op=LOAD Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit: BPF prog-id=39 op=LOAD Feb 9 18:33:56.188000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:33:56.188000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.188000 audit: BPF prog-id=40 op=LOAD Feb 9 18:33:56.188000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit: BPF prog-id=41 op=LOAD Feb 9 18:33:56.189000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit: BPF prog-id=42 op=LOAD Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.189000 audit: BPF prog-id=43 op=LOAD Feb 9 18:33:56.189000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:33:56.189000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.190000 audit: BPF prog-id=44 op=LOAD Feb 9 18:33:56.190000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:33:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit: BPF prog-id=45 op=LOAD Feb 9 18:33:56.192000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit: BPF prog-id=46 op=LOAD Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit: BPF prog-id=47 op=LOAD Feb 9 18:33:56.192000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:33:56.192000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.192000 audit: BPF prog-id=48 op=LOAD Feb 9 18:33:56.192000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:56.193000 audit: BPF prog-id=49 op=LOAD Feb 9 18:33:56.193000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:33:56.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:56.203012 systemd[1]: Started kubelet.service. Feb 9 18:33:56.260216 kubelet[1930]: E0209 18:33:56.260151 1930 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:33:56.262080 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:33:56.262205 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:33:56.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:34:00.520738 env[1353]: time="2024-02-09T18:34:00.520690025Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 18:34:01.252019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1730739964.mount: Deactivated successfully. Feb 9 18:34:03.156159 env[1353]: time="2024-02-09T18:34:03.156102294Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:03.162435 env[1353]: time="2024-02-09T18:34:03.162392930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:03.166170 env[1353]: time="2024-02-09T18:34:03.166134256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:03.170616 env[1353]: time="2024-02-09T18:34:03.170585510Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:03.171387 env[1353]: time="2024-02-09T18:34:03.171357960Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 9 18:34:03.180578 env[1353]: time="2024-02-09T18:34:03.180539392Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 18:34:05.247011 env[1353]: time="2024-02-09T18:34:05.246953292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:05.254785 env[1353]: time="2024-02-09T18:34:05.254753983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:05.260413 env[1353]: time="2024-02-09T18:34:05.260374168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:05.265327 env[1353]: time="2024-02-09T18:34:05.265286585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:05.266285 env[1353]: time="2024-02-09T18:34:05.266256436Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 9 18:34:05.275207 env[1353]: time="2024-02-09T18:34:05.275169259Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 18:34:06.349916 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 18:34:06.367697 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 18:34:06.367765 kernel: audit: type=1130 audit(1707503646.349:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.350151 systemd[1]: Stopped kubelet.service. Feb 9 18:34:06.351744 systemd[1]: Started kubelet.service. Feb 9 18:34:06.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.387096 kernel: audit: type=1131 audit(1707503646.349:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.387196 kernel: audit: type=1130 audit(1707503646.351:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:06.452222 kubelet[1957]: E0209 18:34:06.452178 1957 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:34:06.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:34:06.454898 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:34:06.455018 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:34:06.474495 kernel: audit: type=1131 audit(1707503646.454:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:34:06.962025 env[1353]: time="2024-02-09T18:34:06.961979183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:06.967231 env[1353]: time="2024-02-09T18:34:06.967199562Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:06.972081 env[1353]: time="2024-02-09T18:34:06.972054257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:06.976106 env[1353]: time="2024-02-09T18:34:06.976069742Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:06.976953 env[1353]: time="2024-02-09T18:34:06.976921832Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 9 18:34:06.985556 env[1353]: time="2024-02-09T18:34:06.985522649Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 18:34:08.577961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3243265211.mount: Deactivated successfully. Feb 9 18:34:09.446363 env[1353]: time="2024-02-09T18:34:09.446306545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:09.452322 env[1353]: time="2024-02-09T18:34:09.452285567Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:09.456207 env[1353]: time="2024-02-09T18:34:09.456180248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:09.459716 env[1353]: time="2024-02-09T18:34:09.459692805Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:09.460067 env[1353]: time="2024-02-09T18:34:09.460039248Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 9 18:34:09.469095 env[1353]: time="2024-02-09T18:34:09.469063743Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 18:34:10.229804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3022200990.mount: Deactivated successfully. Feb 9 18:34:10.252338 env[1353]: time="2024-02-09T18:34:10.252297579Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:10.263072 env[1353]: time="2024-02-09T18:34:10.263027968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:10.269451 env[1353]: time="2024-02-09T18:34:10.269407673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:10.276162 env[1353]: time="2024-02-09T18:34:10.276133062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:10.276885 env[1353]: time="2024-02-09T18:34:10.276847789Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 18:34:10.285884 env[1353]: time="2024-02-09T18:34:10.285852721Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 18:34:11.248356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2168464033.mount: Deactivated successfully. Feb 9 18:34:14.952730 env[1353]: time="2024-02-09T18:34:14.952682943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:14.961171 env[1353]: time="2024-02-09T18:34:14.961111261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:14.965552 env[1353]: time="2024-02-09T18:34:14.965516862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:14.970186 env[1353]: time="2024-02-09T18:34:14.970150425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:14.970962 env[1353]: time="2024-02-09T18:34:14.970927232Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 9 18:34:14.979368 env[1353]: time="2024-02-09T18:34:14.979337989Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 18:34:15.698331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount737238042.mount: Deactivated successfully. Feb 9 18:34:16.179542 env[1353]: time="2024-02-09T18:34:16.179498036Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.186212 env[1353]: time="2024-02-09T18:34:16.186175775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.190921 env[1353]: time="2024-02-09T18:34:16.190892136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.194435 env[1353]: time="2024-02-09T18:34:16.194403727Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.194980 env[1353]: time="2024-02-09T18:34:16.194951092Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 18:34:16.599962 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 18:34:16.600135 systemd[1]: Stopped kubelet.service. Feb 9 18:34:16.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.601682 systemd[1]: Started kubelet.service. Feb 9 18:34:16.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.637313 kernel: audit: type=1130 audit(1707503656.599:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.637459 kernel: audit: type=1131 audit(1707503656.599:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.654827 kernel: audit: type=1130 audit(1707503656.600:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:16.686514 kubelet[1992]: E0209 18:34:16.686458 1992 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:34:16.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:34:16.688537 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:34:16.688664 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:34:16.706638 kernel: audit: type=1131 audit(1707503656.688:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:34:21.360712 systemd[1]: Stopped kubelet.service. Feb 9 18:34:21.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:21.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:21.396970 kernel: audit: type=1130 audit(1707503661.360:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:21.397047 kernel: audit: type=1131 audit(1707503661.360:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:21.405672 systemd[1]: Reloading. Feb 9 18:34:21.450082 /usr/lib/systemd/system-generators/torcx-generator[2075]: time="2024-02-09T18:34:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:34:21.450387 /usr/lib/systemd/system-generators/torcx-generator[2075]: time="2024-02-09T18:34:21Z" level=info msg="torcx already run" Feb 9 18:34:21.533608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:34:21.533627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:34:21.548604 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.651642 kernel: audit: type=1400 audit(1707503661.616:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.651726 kernel: audit: type=1400 audit(1707503661.616:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.651751 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.674011 kernel: audit: type=1400 audit(1707503661.616:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.674109 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.697493 kernel: audit: type=1400 audit(1707503661.616:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.697587 kernel: audit: backlog limit exceeded Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.718606 kernel: audit: type=1400 audit(1707503661.616:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.718689 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.741934 kernel: audit: type=1400 audit(1707503661.616:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit: BPF prog-id=50 op=LOAD Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit: BPF prog-id=51 op=LOAD Feb 9 18:34:21.633000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:34:21.633000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.633000 audit: BPF prog-id=52 op=LOAD Feb 9 18:34:21.633000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit: BPF prog-id=53 op=LOAD Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit: BPF prog-id=54 op=LOAD Feb 9 18:34:21.634000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:34:21.634000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.651000 audit: BPF prog-id=55 op=LOAD Feb 9 18:34:21.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.741000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.742000 audit: BPF prog-id=59 op=LOAD Feb 9 18:34:21.742000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit: BPF prog-id=60 op=LOAD Feb 9 18:34:21.744000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit: BPF prog-id=61 op=LOAD Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit: BPF prog-id=62 op=LOAD Feb 9 18:34:21.744000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:34:21.744000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit: BPF prog-id=63 op=LOAD Feb 9 18:34:21.745000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.745000 audit: BPF prog-id=64 op=LOAD Feb 9 18:34:21.745000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:34:21.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:21.767528 systemd[1]: Started kubelet.service. Feb 9 18:34:21.806424 kubelet[2135]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:34:21.806761 kubelet[2135]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:34:21.806809 kubelet[2135]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:34:21.806953 kubelet[2135]: I0209 18:34:21.806923 2135 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:34:22.502304 kubelet[2135]: I0209 18:34:22.502269 2135 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:34:22.502304 kubelet[2135]: I0209 18:34:22.502296 2135 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:34:22.502552 kubelet[2135]: I0209 18:34:22.502529 2135 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:34:22.507670 kubelet[2135]: W0209 18:34:22.507636 2135 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:34:22.507757 kubelet[2135]: E0209 18:34:22.507745 2135 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.507865 kubelet[2135]: I0209 18:34:22.507854 2135 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:34:22.508118 kubelet[2135]: I0209 18:34:22.508099 2135 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:34:22.508313 kubelet[2135]: I0209 18:34:22.508300 2135 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:34:22.508382 kubelet[2135]: I0209 18:34:22.508362 2135 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:34:22.508461 kubelet[2135]: I0209 18:34:22.508387 2135 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:34:22.508461 kubelet[2135]: I0209 18:34:22.508397 2135 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:34:22.508543 kubelet[2135]: I0209 18:34:22.508493 2135 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:34:22.511085 kubelet[2135]: I0209 18:34:22.511068 2135 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:34:22.511177 kubelet[2135]: I0209 18:34:22.511168 2135 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:34:22.511259 kubelet[2135]: I0209 18:34:22.511250 2135 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:34:22.511321 kubelet[2135]: I0209 18:34:22.511313 2135 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:34:22.513701 kubelet[2135]: W0209 18:34:22.513638 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-9ade464be9&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.513701 kubelet[2135]: E0209 18:34:22.513691 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-9ade464be9&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.513809 kubelet[2135]: I0209 18:34:22.513789 2135 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:34:22.514055 kubelet[2135]: W0209 18:34:22.514023 2135 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:34:22.514428 kubelet[2135]: I0209 18:34:22.514393 2135 server.go:1168] "Started kubelet" Feb 9 18:34:22.515000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:22.515000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:22.515000 audit[2135]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000861890 a1=4000840b58 a2=4000861860 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.515000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:22.515000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:22.515000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:22.515000 audit[2135]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000197380 a1=4000840b70 a2=4000861920 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.515000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:22.516196 kubelet[2135]: I0209 18:34:22.515850 2135 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:34:22.516196 kubelet[2135]: I0209 18:34:22.515885 2135 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:34:22.516196 kubelet[2135]: I0209 18:34:22.515944 2135 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:34:22.517461 kubelet[2135]: E0209 18:34:22.517443 2135 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:34:22.517595 kubelet[2135]: E0209 18:34:22.517583 2135 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:34:22.517875 kubelet[2135]: W0209 18:34:22.517841 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.517964 kubelet[2135]: E0209 18:34:22.517955 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.518121 kubelet[2135]: E0209 18:34:22.518048 2135 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-9ade464be9.17b24588c8d903b2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-9ade464be9", UID:"ci-3510.3.2-a-9ade464be9", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-9ade464be9"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 34, 22, 514373554, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 34, 22, 514373554, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.4:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.4:6443: connect: connection refused'(may retry after sleeping) Feb 9 18:34:22.520099 kubelet[2135]: I0209 18:34:22.520081 2135 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:34:22.520836 kubelet[2135]: I0209 18:34:22.520818 2135 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:34:22.520000 audit[2145]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.520000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff2cc3640 a2=0 a3=1 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:34:22.523228 kubelet[2135]: I0209 18:34:22.523193 2135 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:34:22.523000 audit[2146]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.523000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0647f90 a2=0 a3=1 items=0 ppid=2135 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:34:22.527043 kubelet[2135]: I0209 18:34:22.527015 2135 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:34:22.527444 kubelet[2135]: I0209 18:34:22.527400 2135 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:34:22.527000 audit[2148]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.527000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffecf50a50 a2=0 a3=1 items=0 ppid=2135 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:22.528750 kubelet[2135]: W0209 18:34:22.528707 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.528823 kubelet[2135]: E0209 18:34:22.528763 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.528863 kubelet[2135]: E0209 18:34:22.528825 2135 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="200ms" Feb 9 18:34:22.530000 audit[2151]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.530000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd4c0470 a2=0 a3=1 items=0 ppid=2135 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:22.569000 audit[2157]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.569000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc79d7e00 a2=0 a3=1 items=0 ppid=2135 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:34:22.570870 kubelet[2135]: I0209 18:34:22.570841 2135 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:34:22.571000 audit[2158]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:22.571000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1297ba0 a2=0 a3=1 items=0 ppid=2135 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:34:22.572046 kubelet[2135]: I0209 18:34:22.572031 2135 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:34:22.572132 kubelet[2135]: I0209 18:34:22.572122 2135 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:34:22.572199 kubelet[2135]: I0209 18:34:22.572191 2135 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:34:22.572297 kubelet[2135]: E0209 18:34:22.572288 2135 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:34:22.572935 kubelet[2135]: W0209 18:34:22.572913 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.573046 kubelet[2135]: E0209 18:34:22.573035 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:22.572000 audit[2159]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.572000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0be0c10 a2=0 a3=1 items=0 ppid=2135 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:34:22.573000 audit[2161]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:22.573000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1672300 a2=0 a3=1 items=0 ppid=2135 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:34:22.574000 audit[2163]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:22.574000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe5e24da0 a2=0 a3=1 items=0 ppid=2135 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.574000 audit[2162]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.574000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe60964a0 a2=0 a3=1 items=0 ppid=2135 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:34:22.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:34:22.576000 audit[2165]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:22.576000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffea2b27e0 a2=0 a3=1 items=0 ppid=2135 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.576000 audit[2164]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:22.576000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe220900 a2=0 a3=1 items=0 ppid=2135 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:34:22.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:34:22.654973 kubelet[2135]: I0209 18:34:22.654772 2135 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.655148 kubelet[2135]: I0209 18:34:22.655134 2135 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:34:22.655205 kubelet[2135]: I0209 18:34:22.655197 2135 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:34:22.655265 kubelet[2135]: I0209 18:34:22.655258 2135 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:34:22.655423 kubelet[2135]: E0209 18:34:22.655269 2135 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.660259 kubelet[2135]: I0209 18:34:22.660237 2135 policy_none.go:49] "None policy: Start" Feb 9 18:34:22.660933 kubelet[2135]: I0209 18:34:22.660916 2135 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:34:22.661052 kubelet[2135]: I0209 18:34:22.661040 2135 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:34:22.668265 systemd[1]: Created slice kubepods.slice. Feb 9 18:34:22.672521 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:34:22.672827 kubelet[2135]: E0209 18:34:22.672802 2135 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 18:34:22.675109 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:34:22.682385 kubelet[2135]: I0209 18:34:22.682369 2135 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:34:22.682000 audit[2135]: AVC avc: denied { mac_admin } for pid=2135 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:22.682000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:22.682000 audit[2135]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ca3980 a1=4000d27428 a2=4000ca3950 a3=25 items=0 ppid=1 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:22.682000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:22.684045 kubelet[2135]: I0209 18:34:22.684032 2135 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:34:22.684931 kubelet[2135]: E0209 18:34:22.684915 2135 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-9ade464be9\" not found" Feb 9 18:34:22.685103 kubelet[2135]: I0209 18:34:22.685085 2135 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:34:22.729680 kubelet[2135]: E0209 18:34:22.729656 2135 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="400ms" Feb 9 18:34:22.857697 kubelet[2135]: I0209 18:34:22.857676 2135 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.858096 kubelet[2135]: E0209 18:34:22.858079 2135 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.873185 kubelet[2135]: I0209 18:34:22.873164 2135 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:22.874713 kubelet[2135]: I0209 18:34:22.874696 2135 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:22.875885 kubelet[2135]: I0209 18:34:22.875867 2135 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:22.880887 systemd[1]: Created slice kubepods-burstable-poda03c1f3dc97bec89ce812fd916b33555.slice. Feb 9 18:34:22.890357 systemd[1]: Created slice kubepods-burstable-pod3086d346c5dd411e57cafcdc248df956.slice. Feb 9 18:34:22.894016 systemd[1]: Created slice kubepods-burstable-pode3c81cebf894dc79c470e1f8a68b8046.slice. Feb 9 18:34:22.930343 kubelet[2135]: I0209 18:34:22.930313 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.930595 kubelet[2135]: I0209 18:34:22.930581 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e3c81cebf894dc79c470e1f8a68b8046-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-9ade464be9\" (UID: \"e3c81cebf894dc79c470e1f8a68b8046\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.930787 kubelet[2135]: I0209 18:34:22.930748 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.930889 kubelet[2135]: I0209 18:34:22.930880 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.931005 kubelet[2135]: I0209 18:34:22.930996 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.931120 kubelet[2135]: I0209 18:34:22.931110 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.931231 kubelet[2135]: I0209 18:34:22.931222 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.931341 kubelet[2135]: I0209 18:34:22.931331 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:22.931451 kubelet[2135]: I0209 18:34:22.931441 2135 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:23.130604 kubelet[2135]: E0209 18:34:23.130499 2135 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="800ms" Feb 9 18:34:23.190467 env[1353]: time="2024-02-09T18:34:23.190415356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-9ade464be9,Uid:a03c1f3dc97bec89ce812fd916b33555,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:23.193354 env[1353]: time="2024-02-09T18:34:23.193313497Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-9ade464be9,Uid:3086d346c5dd411e57cafcdc248df956,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:23.197181 env[1353]: time="2024-02-09T18:34:23.197042925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-9ade464be9,Uid:e3c81cebf894dc79c470e1f8a68b8046,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:23.259752 kubelet[2135]: I0209 18:34:23.259719 2135 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:23.260045 kubelet[2135]: E0209 18:34:23.260030 2135 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:23.344161 kubelet[2135]: W0209 18:34:23.344064 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.344161 kubelet[2135]: E0209 18:34:23.344125 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.491188 kubelet[2135]: W0209 18:34:23.491041 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.491188 kubelet[2135]: E0209 18:34:23.491084 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.824279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1638454032.mount: Deactivated successfully. Feb 9 18:34:23.857281 env[1353]: time="2024-02-09T18:34:23.857226364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.858294 kubelet[2135]: W0209 18:34:23.858230 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-9ade464be9&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.858607 kubelet[2135]: E0209 18:34:23.858298 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-9ade464be9&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:23.861697 env[1353]: time="2024-02-09T18:34:23.861661197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.872091 env[1353]: time="2024-02-09T18:34:23.872053675Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.878577 env[1353]: time="2024-02-09T18:34:23.878538603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.885788 env[1353]: time="2024-02-09T18:34:23.885744697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.890580 env[1353]: time="2024-02-09T18:34:23.890550012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.893722 env[1353]: time="2024-02-09T18:34:23.893694356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.898264 env[1353]: time="2024-02-09T18:34:23.898233710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.901255 env[1353]: time="2024-02-09T18:34:23.901226372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.905643 env[1353]: time="2024-02-09T18:34:23.905601205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.912863 env[1353]: time="2024-02-09T18:34:23.912831538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.921608 env[1353]: time="2024-02-09T18:34:23.921564163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.931067 kubelet[2135]: E0209 18:34:23.931033 2135 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="1.6s" Feb 9 18:34:24.024276 env[1353]: time="2024-02-09T18:34:24.016179786Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:24.024276 env[1353]: time="2024-02-09T18:34:24.016216066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:24.024276 env[1353]: time="2024-02-09T18:34:24.016237946Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:24.024276 env[1353]: time="2024-02-09T18:34:24.021625666Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bfb3f1aa14a9f8225c23e0b80a4ddd7a7d30ac4b3fe3935cdcf19ece3400589 pid=2174 runtime=io.containerd.runc.v2 Feb 9 18:34:24.033031 env[1353]: time="2024-02-09T18:34:24.032947828Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:24.033842 env[1353]: time="2024-02-09T18:34:24.033039829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:24.033842 env[1353]: time="2024-02-09T18:34:24.033065869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:24.035244 env[1353]: time="2024-02-09T18:34:24.035132964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7 pid=2192 runtime=io.containerd.runc.v2 Feb 9 18:34:24.039171 systemd[1]: Started cri-containerd-2bfb3f1aa14a9f8225c23e0b80a4ddd7a7d30ac4b3fe3935cdcf19ece3400589.scope. Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.053000 audit: BPF prog-id=65 op=LOAD Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2174 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666233663161613134613966383232356332336530623830613464 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2174 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666233663161613134613966383232356332336530623830613464 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.054000 audit: BPF prog-id=66 op=LOAD Feb 9 18:34:24.054000 audit[2193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2174 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666233663161613134613966383232356332336530623830613464 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.055000 audit: BPF prog-id=67 op=LOAD Feb 9 18:34:24.055000 audit[2193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2174 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666233663161613134613966383232356332336530623830613464 Feb 9 18:34:24.055000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:34:24.056000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { perfmon } for pid=2193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit[2193]: AVC avc: denied { bpf } for pid=2193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.056000 audit: BPF prog-id=68 op=LOAD Feb 9 18:34:24.056000 audit[2193]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2174 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666233663161613134613966383232356332336530623830613464 Feb 9 18:34:24.066295 kubelet[2135]: I0209 18:34:24.066252 2135 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:24.066649 kubelet[2135]: E0209 18:34:24.066617 2135 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:24.067401 env[1353]: time="2024-02-09T18:34:24.067200798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:24.067401 env[1353]: time="2024-02-09T18:34:24.067239278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:24.067401 env[1353]: time="2024-02-09T18:34:24.067249998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:24.068790 env[1353]: time="2024-02-09T18:34:24.068680248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c pid=2227 runtime=io.containerd.runc.v2 Feb 9 18:34:24.074546 systemd[1]: Started cri-containerd-ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7.scope. Feb 9 18:34:24.081386 kubelet[2135]: W0209 18:34:24.081285 2135 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:24.081386 kubelet[2135]: E0209 18:34:24.081322 2135 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Feb 9 18:34:24.089907 systemd[1]: Started cri-containerd-49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c.scope. Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.093000 audit: BPF prog-id=69 op=LOAD Feb 9 18:34:24.094000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.094000 audit[2212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2192 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336631646333663666633230663762626335313235326533323135 Feb 9 18:34:24.094000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.094000 audit[2212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2192 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336631646333663666633230663762626335313235326533323135 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit: BPF prog-id=70 op=LOAD Feb 9 18:34:24.095000 audit[2212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2192 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336631646333663666633230663762626335313235326533323135 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.095000 audit: BPF prog-id=71 op=LOAD Feb 9 18:34:24.095000 audit[2212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2192 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336631646333663666633230663762626335313235326533323135 Feb 9 18:34:24.096000 audit: BPF prog-id=71 op=UNLOAD Feb 9 18:34:24.096000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.096000 audit: BPF prog-id=72 op=LOAD Feb 9 18:34:24.096000 audit[2212]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2192 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336631646333663666633230663762626335313235326533323135 Feb 9 18:34:24.101715 env[1353]: time="2024-02-09T18:34:24.101665809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-9ade464be9,Uid:a03c1f3dc97bec89ce812fd916b33555,Namespace:kube-system,Attempt:0,} returns sandbox id \"2bfb3f1aa14a9f8225c23e0b80a4ddd7a7d30ac4b3fe3935cdcf19ece3400589\"" Feb 9 18:34:24.108585 env[1353]: time="2024-02-09T18:34:24.108537219Z" level=info msg="CreateContainer within sandbox \"2bfb3f1aa14a9f8225c23e0b80a4ddd7a7d30ac4b3fe3935cdcf19ece3400589\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.123000 audit: BPF prog-id=73 op=LOAD Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2227 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613232376633663830366331663363656331303262356537326134 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2227 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613232376633663830366331663363656331303262356537326134 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.124000 audit: BPF prog-id=74 op=LOAD Feb 9 18:34:24.124000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2227 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613232376633663830366331663363656331303262356537326134 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.125000 audit: BPF prog-id=75 op=LOAD Feb 9 18:34:24.125000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2227 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613232376633663830366331663363656331303262356537326134 Feb 9 18:34:24.126000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:34:24.126000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.126000 audit: BPF prog-id=76 op=LOAD Feb 9 18:34:24.126000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2227 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439613232376633663830366331663363656331303262356537326134 Feb 9 18:34:24.129913 env[1353]: time="2024-02-09T18:34:24.129868654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-9ade464be9,Uid:3086d346c5dd411e57cafcdc248df956,Namespace:kube-system,Attempt:0,} returns sandbox id \"ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7\"" Feb 9 18:34:24.134162 env[1353]: time="2024-02-09T18:34:24.134128165Z" level=info msg="CreateContainer within sandbox \"ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 18:34:24.155391 env[1353]: time="2024-02-09T18:34:24.155346040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-9ade464be9,Uid:e3c81cebf894dc79c470e1f8a68b8046,Namespace:kube-system,Attempt:0,} returns sandbox id \"49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c\"" Feb 9 18:34:24.157937 env[1353]: time="2024-02-09T18:34:24.157891258Z" level=info msg="CreateContainer within sandbox \"49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 18:34:24.167126 env[1353]: time="2024-02-09T18:34:24.167086805Z" level=info msg="CreateContainer within sandbox \"2bfb3f1aa14a9f8225c23e0b80a4ddd7a7d30ac4b3fe3935cdcf19ece3400589\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cf24e08a6ea27939ab6fa2194cdd11ec791b83894d0d37162dd92fbefdd95686\"" Feb 9 18:34:24.167854 env[1353]: time="2024-02-09T18:34:24.167816810Z" level=info msg="StartContainer for \"cf24e08a6ea27939ab6fa2194cdd11ec791b83894d0d37162dd92fbefdd95686\"" Feb 9 18:34:24.185043 systemd[1]: Started cri-containerd-cf24e08a6ea27939ab6fa2194cdd11ec791b83894d0d37162dd92fbefdd95686.scope. Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.201000 audit: BPF prog-id=77 op=LOAD Feb 9 18:34:24.202000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.202000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323465303861366561323739333961623666613231393463646431 Feb 9 18:34:24.202000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.202000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323465303861366561323739333961623666613231393463646431 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit: BPF prog-id=78 op=LOAD Feb 9 18:34:24.203000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323465303861366561323739333961623666613231393463646431 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.203000 audit: BPF prog-id=79 op=LOAD Feb 9 18:34:24.203000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323465303861366561323739333961623666613231393463646431 Feb 9 18:34:24.204000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:34:24.204000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.204000 audit: BPF prog-id=80 op=LOAD Feb 9 18:34:24.204000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323465303861366561323739333961623666613231393463646431 Feb 9 18:34:24.214745 env[1353]: time="2024-02-09T18:34:24.214692192Z" level=info msg="CreateContainer within sandbox \"49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194\"" Feb 9 18:34:24.215726 env[1353]: time="2024-02-09T18:34:24.215700199Z" level=info msg="StartContainer for \"4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194\"" Feb 9 18:34:24.225112 env[1353]: time="2024-02-09T18:34:24.225054187Z" level=info msg="CreateContainer within sandbox \"ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8\"" Feb 9 18:34:24.225636 env[1353]: time="2024-02-09T18:34:24.225603471Z" level=info msg="StartContainer for \"d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8\"" Feb 9 18:34:24.243954 env[1353]: time="2024-02-09T18:34:24.241607348Z" level=info msg="StartContainer for \"cf24e08a6ea27939ab6fa2194cdd11ec791b83894d0d37162dd92fbefdd95686\" returns successfully" Feb 9 18:34:24.243644 systemd[1]: Started cri-containerd-4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194.scope. Feb 9 18:34:24.259010 systemd[1]: Started cri-containerd-d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8.scope. Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.276000 audit: BPF prog-id=81 op=LOAD Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2227 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313061623463666365393565616239376133663562373237363736 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2227 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313061623463666365393565616239376133663562373237363736 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit: BPF prog-id=82 op=LOAD Feb 9 18:34:24.278000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2227 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313061623463666365393565616239376133663562373237363736 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit: BPF prog-id=83 op=LOAD Feb 9 18:34:24.278000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2227 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313061623463666365393565616239376133663562373237363736 Feb 9 18:34:24.278000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:34:24.278000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.278000 audit: BPF prog-id=84 op=LOAD Feb 9 18:34:24.278000 audit[2325]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2227 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313061623463666365393565616239376133663562373237363736 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.286000 audit: BPF prog-id=85 op=LOAD Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2192 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373139643430346537343739323130376365333033353966646364 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2192 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373139643430346537343739323130376365333033353966646364 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit: BPF prog-id=86 op=LOAD Feb 9 18:34:24.287000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2192 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373139643430346537343739323130376365333033353966646364 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit: BPF prog-id=87 op=LOAD Feb 9 18:34:24.287000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2192 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373139643430346537343739323130376365333033353966646364 Feb 9 18:34:24.287000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:34:24.287000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:24.287000 audit: BPF prog-id=88 op=LOAD Feb 9 18:34:24.287000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2192 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:24.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373139643430346537343739323130376365333033353966646364 Feb 9 18:34:24.329125 env[1353]: time="2024-02-09T18:34:24.329010144Z" level=info msg="StartContainer for \"d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8\" returns successfully" Feb 9 18:34:24.346986 env[1353]: time="2024-02-09T18:34:24.346918915Z" level=info msg="StartContainer for \"4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194\" returns successfully" Feb 9 18:34:25.668381 kubelet[2135]: I0209 18:34:25.668357 2135 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:26.475000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.475000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000e62000 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.475000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.475000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400241e0a0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003eac030 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.485000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.485000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4003f2c210 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.497000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.497000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40014fff40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.497000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:26.497000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=4004657c50 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:34:26.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:34:26.861334 kubelet[2135]: I0209 18:34:26.861294 2135 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:27.061272 kubelet[2135]: E0209 18:34:27.061234 2135 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Feb 9 18:34:27.363182 kubelet[2135]: E0209 18:34:27.363151 2135 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:27.519851 kubelet[2135]: I0209 18:34:27.519808 2135 apiserver.go:52] "Watching apiserver" Feb 9 18:34:27.527833 kubelet[2135]: I0209 18:34:27.527782 2135 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:34:27.561162 kubelet[2135]: I0209 18:34:27.561131 2135 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:34:27.875000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:27.881411 kernel: kauditd_printk_skb: 625 callbacks suppressed Feb 9 18:34:27.881527 kernel: audit: type=1400 audit(1707503667.875:672): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:27.875000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d120c0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:27.934660 kernel: audit: type=1300 audit(1707503667.875:672): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d120c0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:27.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:27.962508 kernel: audit: type=1327 audit(1707503667.875:672): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:27.875000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:27.989588 kernel: audit: type=1400 audit(1707503667.875:673): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:27.875000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400033f1c0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:28.019992 kernel: audit: type=1300 audit(1707503667.875:673): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400033f1c0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:27.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:28.046280 kernel: audit: type=1327 audit(1707503667.875:673): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:29.867098 systemd[1]: Reloading. Feb 9 18:34:29.939542 /usr/lib/systemd/system-generators/torcx-generator[2426]: time="2024-02-09T18:34:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:34:29.939876 /usr/lib/systemd/system-generators/torcx-generator[2426]: time="2024-02-09T18:34:29Z" level=info msg="torcx already run" Feb 9 18:34:30.011037 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:34:30.011199 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:34:30.026530 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150091 kernel: audit: type=1400 audit(1707503670.114:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150193 kernel: audit: type=1400 audit(1707503670.114:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.157511 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:34:30.157577 kernel: audit: type=1400 audit(1707503670.114:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit: BPF prog-id=89 op=LOAD Feb 9 18:34:30.133000 audit: BPF prog-id=65 op=UNLOAD Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit: BPF prog-id=90 op=LOAD Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit: BPF prog-id=91 op=LOAD Feb 9 18:34:30.150000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:34:30.150000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit: BPF prog-id=92 op=LOAD Feb 9 18:34:30.150000 audit: BPF prog-id=52 op=UNLOAD Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit: BPF prog-id=93 op=LOAD Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.151000 audit: BPF prog-id=94 op=LOAD Feb 9 18:34:30.151000 audit: BPF prog-id=53 op=UNLOAD Feb 9 18:34:30.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit: BPF prog-id=96 op=LOAD Feb 9 18:34:30.177000 audit: BPF prog-id=56 op=UNLOAD Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit: BPF prog-id=97 op=LOAD Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.178000 audit: BPF prog-id=98 op=LOAD Feb 9 18:34:30.178000 audit: BPF prog-id=57 op=UNLOAD Feb 9 18:34:30.178000 audit: BPF prog-id=58 op=UNLOAD Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.179000 audit: BPF prog-id=99 op=LOAD Feb 9 18:34:30.180000 audit: BPF prog-id=59 op=UNLOAD Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.180000 audit: BPF prog-id=100 op=LOAD Feb 9 18:34:30.180000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.182000 audit: BPF prog-id=101 op=LOAD Feb 9 18:34:30.182000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit: BPF prog-id=102 op=LOAD Feb 9 18:34:30.184000 audit: BPF prog-id=60 op=UNLOAD Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit: BPF prog-id=103 op=LOAD Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit: BPF prog-id=104 op=LOAD Feb 9 18:34:30.185000 audit: BPF prog-id=61 op=UNLOAD Feb 9 18:34:30.185000 audit: BPF prog-id=62 op=UNLOAD Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.186000 audit: BPF prog-id=105 op=LOAD Feb 9 18:34:30.186000 audit: BPF prog-id=63 op=UNLOAD Feb 9 18:34:30.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.187000 audit: BPF prog-id=106 op=LOAD Feb 9 18:34:30.187000 audit: BPF prog-id=64 op=UNLOAD Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188000 audit: BPF prog-id=107 op=LOAD Feb 9 18:34:30.188000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189000 audit: BPF prog-id=108 op=LOAD Feb 9 18:34:30.189000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.190000 audit: BPF prog-id=109 op=LOAD Feb 9 18:34:30.190000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:34:30.219602 systemd[1]: Stopping kubelet.service... Feb 9 18:34:30.234824 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 18:34:30.235026 systemd[1]: Stopped kubelet.service. Feb 9 18:34:30.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:30.236732 systemd[1]: Started kubelet.service. Feb 9 18:34:30.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:30.310888 kubelet[2484]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:34:30.311202 kubelet[2484]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:34:30.311246 kubelet[2484]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:34:30.311376 kubelet[2484]: I0209 18:34:30.311342 2484 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:34:30.315707 kubelet[2484]: I0209 18:34:30.315672 2484 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:34:30.315707 kubelet[2484]: I0209 18:34:30.315703 2484 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:34:30.315917 kubelet[2484]: I0209 18:34:30.315897 2484 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:34:30.317427 kubelet[2484]: I0209 18:34:30.317402 2484 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 18:34:30.319530 kubelet[2484]: I0209 18:34:30.319475 2484 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:34:30.320279 kubelet[2484]: W0209 18:34:30.320264 2484 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:34:30.320839 kubelet[2484]: I0209 18:34:30.320823 2484 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:34:30.320995 kubelet[2484]: I0209 18:34:30.320982 2484 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:34:30.321062 kubelet[2484]: I0209 18:34:30.321046 2484 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:34:30.321140 kubelet[2484]: I0209 18:34:30.321063 2484 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:34:30.321140 kubelet[2484]: I0209 18:34:30.321073 2484 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:34:30.321140 kubelet[2484]: I0209 18:34:30.321098 2484 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:34:30.323869 kubelet[2484]: I0209 18:34:30.323846 2484 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:34:30.323869 kubelet[2484]: I0209 18:34:30.323873 2484 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:34:30.323990 kubelet[2484]: I0209 18:34:30.323896 2484 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:34:30.323990 kubelet[2484]: I0209 18:34:30.323910 2484 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:34:30.324862 kubelet[2484]: I0209 18:34:30.324839 2484 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:34:30.325294 kubelet[2484]: I0209 18:34:30.325271 2484 server.go:1168] "Started kubelet" Feb 9 18:34:30.341966 kubelet[2484]: I0209 18:34:30.341945 2484 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:34:30.342657 kubelet[2484]: I0209 18:34:30.342641 2484 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:34:30.343649 kubelet[2484]: I0209 18:34:30.343634 2484 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:34:30.343000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.343000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:30.343000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000261650 a1=4000d253e0 a2=40002615f0 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.343000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:30.344695 kubelet[2484]: I0209 18:34:30.344680 2484 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:34:30.344000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.344000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:30.344000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d318a0 a1=4000d253f8 a2=4000261770 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.344000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:30.344970 kubelet[2484]: I0209 18:34:30.344959 2484 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:34:30.345036 kubelet[2484]: I0209 18:34:30.345027 2484 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:34:30.350195 kubelet[2484]: I0209 18:34:30.350176 2484 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:34:30.351623 kubelet[2484]: I0209 18:34:30.351606 2484 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:34:30.352953 kubelet[2484]: I0209 18:34:30.352937 2484 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:34:30.355241 kubelet[2484]: I0209 18:34:30.355224 2484 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:34:30.355361 kubelet[2484]: I0209 18:34:30.355350 2484 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:34:30.355441 kubelet[2484]: I0209 18:34:30.355431 2484 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:34:30.355560 kubelet[2484]: E0209 18:34:30.355550 2484 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:34:30.371999 kubelet[2484]: E0209 18:34:30.371959 2484 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:34:30.371999 kubelet[2484]: E0209 18:34:30.371992 2484 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:34:30.443942 kubelet[2484]: I0209 18:34:30.443846 2484 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:34:30.444077 kubelet[2484]: I0209 18:34:30.444067 2484 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:34:30.444143 kubelet[2484]: I0209 18:34:30.444135 2484 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:34:30.444333 kubelet[2484]: I0209 18:34:30.444323 2484 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 18:34:30.444403 kubelet[2484]: I0209 18:34:30.444394 2484 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 18:34:30.444452 kubelet[2484]: I0209 18:34:30.444444 2484 policy_none.go:49] "None policy: Start" Feb 9 18:34:30.445161 kubelet[2484]: I0209 18:34:30.445145 2484 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:34:30.445267 kubelet[2484]: I0209 18:34:30.445258 2484 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:34:30.445542 kubelet[2484]: I0209 18:34:30.445530 2484 state_mem.go:75] "Updated machine memory state" Feb 9 18:34:30.454885 kubelet[2484]: I0209 18:34:30.454866 2484 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.457364 kubelet[2484]: E0209 18:34:30.457344 2484 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 18:34:30.464409 kubelet[2484]: I0209 18:34:30.464388 2484 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.464875 kubelet[2484]: I0209 18:34:30.464862 2484 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.467354 kubelet[2484]: I0209 18:34:30.467339 2484 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:34:30.466000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.466000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:34:30.466000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40012e1680 a1=4000d24150 a2=40012e1650 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.466000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:34:30.467788 kubelet[2484]: I0209 18:34:30.467773 2484 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:34:30.468024 kubelet[2484]: I0209 18:34:30.468012 2484 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:34:30.657908 kubelet[2484]: I0209 18:34:30.657874 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:30.658110 kubelet[2484]: I0209 18:34:30.658097 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:30.658223 kubelet[2484]: I0209 18:34:30.658212 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:30.664886 kubelet[2484]: W0209 18:34:30.664865 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:34:30.669337 kubelet[2484]: W0209 18:34:30.669312 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:34:30.669789 kubelet[2484]: W0209 18:34:30.669769 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:34:30.755685 kubelet[2484]: I0209 18:34:30.755572 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755685 kubelet[2484]: I0209 18:34:30.755620 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755685 kubelet[2484]: I0209 18:34:30.755646 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755685 kubelet[2484]: I0209 18:34:30.755667 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755872 kubelet[2484]: I0209 18:34:30.755698 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755872 kubelet[2484]: I0209 18:34:30.755723 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a03c1f3dc97bec89ce812fd916b33555-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-9ade464be9\" (UID: \"a03c1f3dc97bec89ce812fd916b33555\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755872 kubelet[2484]: I0209 18:34:30.755742 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755872 kubelet[2484]: I0209 18:34:30.755763 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3086d346c5dd411e57cafcdc248df956-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-9ade464be9\" (UID: \"3086d346c5dd411e57cafcdc248df956\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:30.755872 kubelet[2484]: I0209 18:34:30.755783 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e3c81cebf894dc79c470e1f8a68b8046-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-9ade464be9\" (UID: \"e3c81cebf894dc79c470e1f8a68b8046\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-9ade464be9" Feb 9 18:34:31.332899 kubelet[2484]: I0209 18:34:31.332855 2484 apiserver.go:52] "Watching apiserver" Feb 9 18:34:31.352243 kubelet[2484]: I0209 18:34:31.352175 2484 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:34:31.361674 kubelet[2484]: I0209 18:34:31.361612 2484 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:34:31.533484 kubelet[2484]: I0209 18:34:31.533440 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" podStartSLOduration=1.533375798 podCreationTimestamp="2024-02-09 18:34:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:31.462611395 +0000 UTC m=+1.217559992" watchObservedRunningTime="2024-02-09 18:34:31.533375798 +0000 UTC m=+1.288324395" Feb 9 18:34:31.577906 kubelet[2484]: I0209 18:34:31.577872 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-9ade464be9" podStartSLOduration=1.577832396 podCreationTimestamp="2024-02-09 18:34:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:31.534333284 +0000 UTC m=+1.289281841" watchObservedRunningTime="2024-02-09 18:34:31.577832396 +0000 UTC m=+1.332780993" Feb 9 18:34:31.597696 kubelet[2484]: I0209 18:34:31.597603 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-9ade464be9" podStartSLOduration=1.597564679 podCreationTimestamp="2024-02-09 18:34:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:31.579127404 +0000 UTC m=+1.334076001" watchObservedRunningTime="2024-02-09 18:34:31.597564679 +0000 UTC m=+1.352513276" Feb 9 18:34:35.662917 sudo[1726]: pam_unix(sudo:session): session closed for user root Feb 9 18:34:35.662000 audit[1726]: USER_END pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.668286 kernel: kauditd_printk_skb: 278 callbacks suppressed Feb 9 18:34:35.668349 kernel: audit: type=1106 audit(1707503675.662:911): pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.662000 audit[1726]: CRED_DISP pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.709102 kernel: audit: type=1104 audit(1707503675.662:912): pid=1726 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.746499 sshd[1723]: pam_unix(sshd:session): session closed for user core Feb 9 18:34:35.746000 audit[1723]: USER_END pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:35.747000 audit[1723]: CRED_DISP pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:35.773556 kernel: audit: type=1106 audit(1707503675.746:913): pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:35.773680 systemd[1]: sshd@6-10.200.20.4:22-10.200.12.6:38300.service: Deactivated successfully. Feb 9 18:34:35.774448 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 18:34:35.774620 systemd[1]: session-9.scope: Consumed 5.979s CPU time. Feb 9 18:34:35.794893 systemd-logind[1341]: Session 9 logged out. Waiting for processes to exit. Feb 9 18:34:35.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.816096 kernel: audit: type=1104 audit(1707503675.747:914): pid=1723 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:35.816271 kernel: audit: type=1131 audit(1707503675.773:915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.12.6:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:35.816655 systemd-logind[1341]: Removed session 9. Feb 9 18:34:44.900000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:44.900000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f8940 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:44.955999 kernel: audit: type=1400 audit(1707503684.900:916): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:44.956150 kernel: audit: type=1300 audit(1707503684.900:916): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f8940 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:44.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:44.981269 kernel: audit: type=1327 audit(1707503684.900:916): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:44.900000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:45.004442 kernel: audit: type=1400 audit(1707503684.900:917): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:44.900000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f8a80 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:45.034425 kernel: audit: type=1300 audit(1707503684.900:917): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f8a80 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:44.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:45.058729 kernel: audit: type=1327 audit(1707503684.900:917): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:44.900000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:45.082351 kernel: audit: type=1400 audit(1707503684.900:918): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:44.900000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011394a0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:45.113023 kernel: audit: type=1300 audit(1707503684.900:918): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011394a0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:44.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:45.139763 kernel: audit: type=1327 audit(1707503684.900:918): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:44.900000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:45.163168 kernel: audit: type=1400 audit(1707503684.900:919): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:44.900000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011395e0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:44.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:45.004000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 18:34:45.004000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001137580 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:34:45.004000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:45.446274 kubelet[2484]: I0209 18:34:45.446183 2484 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 18:34:45.447142 env[1353]: time="2024-02-09T18:34:45.447098407Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:34:45.447385 kubelet[2484]: I0209 18:34:45.447279 2484 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 18:34:45.897407 kubelet[2484]: I0209 18:34:45.897377 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:45.902608 systemd[1]: Created slice kubepods-besteffort-podb773fc8c_b899_4517_b130_e56d3956cc35.slice. Feb 9 18:34:45.945097 kubelet[2484]: I0209 18:34:45.945069 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b773fc8c-b899-4517-b130-e56d3956cc35-var-lib-calico\") pod \"tigera-operator-7ff8dc855-qb45c\" (UID: \"b773fc8c-b899-4517-b130-e56d3956cc35\") " pod="tigera-operator/tigera-operator-7ff8dc855-qb45c" Feb 9 18:34:45.945309 kubelet[2484]: I0209 18:34:45.945297 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46hsv\" (UniqueName: \"kubernetes.io/projected/b773fc8c-b899-4517-b130-e56d3956cc35-kube-api-access-46hsv\") pod \"tigera-operator-7ff8dc855-qb45c\" (UID: \"b773fc8c-b899-4517-b130-e56d3956cc35\") " pod="tigera-operator/tigera-operator-7ff8dc855-qb45c" Feb 9 18:34:46.092714 kubelet[2484]: I0209 18:34:46.092663 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:46.097575 systemd[1]: Created slice kubepods-besteffort-pod71f17c71_07c7_4e17_8ab4_794a13e6e82e.slice. Feb 9 18:34:46.146155 kubelet[2484]: I0209 18:34:46.146117 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/71f17c71-07c7-4e17-8ab4-794a13e6e82e-lib-modules\") pod \"kube-proxy-w2rqj\" (UID: \"71f17c71-07c7-4e17-8ab4-794a13e6e82e\") " pod="kube-system/kube-proxy-w2rqj" Feb 9 18:34:46.146305 kubelet[2484]: I0209 18:34:46.146190 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/71f17c71-07c7-4e17-8ab4-794a13e6e82e-kube-proxy\") pod \"kube-proxy-w2rqj\" (UID: \"71f17c71-07c7-4e17-8ab4-794a13e6e82e\") " pod="kube-system/kube-proxy-w2rqj" Feb 9 18:34:46.146305 kubelet[2484]: I0209 18:34:46.146210 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/71f17c71-07c7-4e17-8ab4-794a13e6e82e-xtables-lock\") pod \"kube-proxy-w2rqj\" (UID: \"71f17c71-07c7-4e17-8ab4-794a13e6e82e\") " pod="kube-system/kube-proxy-w2rqj" Feb 9 18:34:46.146305 kubelet[2484]: I0209 18:34:46.146246 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7fjm2\" (UniqueName: \"kubernetes.io/projected/71f17c71-07c7-4e17-8ab4-794a13e6e82e-kube-api-access-7fjm2\") pod \"kube-proxy-w2rqj\" (UID: \"71f17c71-07c7-4e17-8ab4-794a13e6e82e\") " pod="kube-system/kube-proxy-w2rqj" Feb 9 18:34:46.210711 env[1353]: time="2024-02-09T18:34:46.210603784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qb45c,Uid:b773fc8c-b899-4517-b130-e56d3956cc35,Namespace:tigera-operator,Attempt:0,}" Feb 9 18:34:46.245707 env[1353]: time="2024-02-09T18:34:46.245622788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:46.245707 env[1353]: time="2024-02-09T18:34:46.245660908Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:46.245707 env[1353]: time="2024-02-09T18:34:46.245670668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:46.246185 env[1353]: time="2024-02-09T18:34:46.246020910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991 pid=2568 runtime=io.containerd.runc.v2 Feb 9 18:34:46.282269 systemd[1]: Started cri-containerd-40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991.scope. Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.294000 audit: BPF prog-id=110 op=LOAD Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313339643761363035326162336630656231333065333239663464 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313339643761363035326162336630656231333065333239663464 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit: BPF prog-id=111 op=LOAD Feb 9 18:34:46.295000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313339643761363035326162336630656231333065333239663464 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit: BPF prog-id=112 op=LOAD Feb 9 18:34:46.295000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313339643761363035326162336630656231333065333239663464 Feb 9 18:34:46.295000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:34:46.295000 audit: BPF prog-id=111 op=UNLOAD Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.295000 audit: BPF prog-id=113 op=LOAD Feb 9 18:34:46.295000 audit[2578]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2568 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313339643761363035326162336630656231333065333239663464 Feb 9 18:34:46.322398 env[1353]: time="2024-02-09T18:34:46.322361427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qb45c,Uid:b773fc8c-b899-4517-b130-e56d3956cc35,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991\"" Feb 9 18:34:46.325893 env[1353]: time="2024-02-09T18:34:46.325735643Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 18:34:46.400273 env[1353]: time="2024-02-09T18:34:46.399920990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w2rqj,Uid:71f17c71-07c7-4e17-8ab4-794a13e6e82e,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:46.434378 env[1353]: time="2024-02-09T18:34:46.434306671Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:46.434614 env[1353]: time="2024-02-09T18:34:46.434579072Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:46.434707 env[1353]: time="2024-02-09T18:34:46.434686272Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:46.434985 env[1353]: time="2024-02-09T18:34:46.434942634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe89120988d94ac704802c6aad260614d14fd9a0945d833aac1044f1530d1457 pid=2611 runtime=io.containerd.runc.v2 Feb 9 18:34:46.448218 systemd[1]: Started cri-containerd-fe89120988d94ac704802c6aad260614d14fd9a0945d833aac1044f1530d1457.scope. Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.458000 audit: BPF prog-id=114 op=LOAD Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2611 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383931323039383864393461633730343830326336616164323630 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2611 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383931323039383864393461633730343830326336616164323630 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit: BPF prog-id=115 op=LOAD Feb 9 18:34:46.459000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2611 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383931323039383864393461633730343830326336616164323630 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit: BPF prog-id=116 op=LOAD Feb 9 18:34:46.459000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2611 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383931323039383864393461633730343830326336616164323630 Feb 9 18:34:46.459000 audit: BPF prog-id=116 op=UNLOAD Feb 9 18:34:46.459000 audit: BPF prog-id=115 op=UNLOAD Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.459000 audit: BPF prog-id=117 op=LOAD Feb 9 18:34:46.459000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2611 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383931323039383864393461633730343830326336616164323630 Feb 9 18:34:46.476926 env[1353]: time="2024-02-09T18:34:46.476882270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w2rqj,Uid:71f17c71-07c7-4e17-8ab4-794a13e6e82e,Namespace:kube-system,Attempt:0,} returns sandbox id \"fe89120988d94ac704802c6aad260614d14fd9a0945d833aac1044f1530d1457\"" Feb 9 18:34:46.481691 env[1353]: time="2024-02-09T18:34:46.481642812Z" level=info msg="CreateContainer within sandbox \"fe89120988d94ac704802c6aad260614d14fd9a0945d833aac1044f1530d1457\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:34:46.516585 env[1353]: time="2024-02-09T18:34:46.516546815Z" level=info msg="CreateContainer within sandbox \"fe89120988d94ac704802c6aad260614d14fd9a0945d833aac1044f1530d1457\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"564f71068a79522bee594c293518cb23453742a3a6bbc3ad8bd8a3775de4816e\"" Feb 9 18:34:46.518253 env[1353]: time="2024-02-09T18:34:46.517691181Z" level=info msg="StartContainer for \"564f71068a79522bee594c293518cb23453742a3a6bbc3ad8bd8a3775de4816e\"" Feb 9 18:34:46.535135 systemd[1]: Started cri-containerd-564f71068a79522bee594c293518cb23453742a3a6bbc3ad8bd8a3775de4816e.scope. Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2611 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536346637313036386137393532326265653539346332393335313863 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit: BPF prog-id=118 op=LOAD Feb 9 18:34:46.549000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2611 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536346637313036386137393532326265653539346332393335313863 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit: BPF prog-id=119 op=LOAD Feb 9 18:34:46.549000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2611 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536346637313036386137393532326265653539346332393335313863 Feb 9 18:34:46.549000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:34:46.549000 audit: BPF prog-id=118 op=UNLOAD Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.549000 audit: BPF prog-id=120 op=LOAD Feb 9 18:34:46.549000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2611 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536346637313036386137393532326265653539346332393335313863 Feb 9 18:34:46.566381 env[1353]: time="2024-02-09T18:34:46.566327528Z" level=info msg="StartContainer for \"564f71068a79522bee594c293518cb23453742a3a6bbc3ad8bd8a3775de4816e\" returns successfully" Feb 9 18:34:46.613000 audit[2702]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.613000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1fc0450 a2=0 a3=ffffbd2fd6c0 items=0 ppid=2664 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:34:46.614000 audit[2703]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.614000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb44fab0 a2=0 a3=ffffb13a56c0 items=0 ppid=2664 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:34:46.620000 audit[2704]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.620000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2431ff0 a2=0 a3=ffffb60446c0 items=0 ppid=2664 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:34:46.621000 audit[2705]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.621000 audit[2705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9555d70 a2=0 a3=ffffaf2246c0 items=0 ppid=2664 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:34:46.622000 audit[2707]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.622000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd46c39f0 a2=0 a3=ffffb2c7c6c0 items=0 ppid=2664 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:34:46.623000 audit[2706]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.623000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa34b110 a2=0 a3=ffff848f46c0 items=0 ppid=2664 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:34:46.716000 audit[2708]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.716000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdd0ca6b0 a2=0 a3=ffff941806c0 items=0 ppid=2664 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:34:46.720000 audit[2710]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.720000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd69ee720 a2=0 a3=ffff8880a6c0 items=0 ppid=2664 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:34:46.726000 audit[2713]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.726000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc1d75930 a2=0 a3=ffff9501b6c0 items=0 ppid=2664 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:34:46.728000 audit[2714]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.728000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdaddeeb0 a2=0 a3=ffffbf40e6c0 items=0 ppid=2664 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:34:46.730000 audit[2716]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.730000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5304af0 a2=0 a3=ffff882ac6c0 items=0 ppid=2664 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:34:46.731000 audit[2717]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.731000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe02ff4e0 a2=0 a3=ffffa17186c0 items=0 ppid=2664 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:34:46.734000 audit[2719]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.734000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4eeb190 a2=0 a3=ffffb0cc66c0 items=0 ppid=2664 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:34:46.737000 audit[2722]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.737000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd3452e00 a2=0 a3=ffff9f9146c0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:34:46.738000 audit[2723]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.738000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7da05c0 a2=0 a3=ffff80b136c0 items=0 ppid=2664 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:34:46.740000 audit[2725]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.740000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff75fcd70 a2=0 a3=ffff862ee6c0 items=0 ppid=2664 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:34:46.741000 audit[2726]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.741000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5aa3390 a2=0 a3=ffff8aa1c6c0 items=0 ppid=2664 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:34:46.743000 audit[2728]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.743000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdce26240 a2=0 a3=ffff8bf6c6c0 items=0 ppid=2664 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:46.746000 audit[2731]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.746000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec2de0a0 a2=0 a3=ffff7fc8f6c0 items=0 ppid=2664 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:46.750000 audit[2734]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.750000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6104930 a2=0 a3=ffffae9196c0 items=0 ppid=2664 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:34:46.751000 audit[2735]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.751000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffea6d9480 a2=0 a3=ffffaad636c0 items=0 ppid=2664 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:34:46.753000 audit[2737]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdbd710c0 a2=0 a3=ffffb96176c0 items=0 ppid=2664 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:46.756000 audit[2740]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.756000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff0a039e0 a2=0 a3=ffff9a41e6c0 items=0 ppid=2664 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:46.761000 audit[2745]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.761000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0a2ee60 a2=0 a3=ffffb6d406c0 items=0 ppid=2664 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:34:46.763000 audit[2747]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:46.763000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff1073ca0 a2=0 a3=ffffa3c626c0 items=0 ppid=2664 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:34:46.806000 audit[2749]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.806000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffecbab3d0 a2=0 a3=ffffa4d976c0 items=0 ppid=2664 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.841000 audit[2749]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.841000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffecbab3d0 a2=0 a3=ffffa4d976c0 items=0 ppid=2664 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.846000 audit[2755]: NETFILTER_CFG table=filter:69 family=2 entries=14 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.846000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe5fc99e0 a2=0 a3=ffffb45436c0 items=0 ppid=2664 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.846000 audit[2755]: NETFILTER_CFG table=nat:70 family=2 entries=12 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.846000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe5fc99e0 a2=0 a3=ffffb45436c0 items=0 ppid=2664 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.849000 audit[2756]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.849000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffd4a2450 a2=0 a3=ffff8297b6c0 items=0 ppid=2664 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:34:46.851000 audit[2758]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.851000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff09f8790 a2=0 a3=ffffbcce66c0 items=0 ppid=2664 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:34:46.856000 audit[2761]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.856000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff2e67690 a2=0 a3=ffffa91ed6c0 items=0 ppid=2664 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:34:46.857000 audit[2762]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.857000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef046d20 a2=0 a3=ffff801316c0 items=0 ppid=2664 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:34:46.859000 audit[2764]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.859000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe90e9bf0 a2=0 a3=ffffa78306c0 items=0 ppid=2664 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:34:46.860000 audit[2765]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.860000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff326a4a0 a2=0 a3=ffff8c6846c0 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:34:46.863000 audit[2767]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.863000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc598fdf0 a2=0 a3=ffff981226c0 items=0 ppid=2664 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:34:46.866000 audit[2770]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.866000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffff3f1580 a2=0 a3=ffff904966c0 items=0 ppid=2664 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:34:46.867000 audit[2771]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.867000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3b7c000 a2=0 a3=ffff97d9f6c0 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:34:46.869000 audit[2773]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.869000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffcac5820 a2=0 a3=ffff85fc76c0 items=0 ppid=2664 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:34:46.871000 audit[2774]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.871000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd57a26b0 a2=0 a3=ffffbbaec6c0 items=0 ppid=2664 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:34:46.873000 audit[2776]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.873000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffef5bbef0 a2=0 a3=ffff833e16c0 items=0 ppid=2664 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:46.876000 audit[2779]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.876000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd829b670 a2=0 a3=ffffba0cf6c0 items=0 ppid=2664 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:34:46.881000 audit[2782]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.881000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd892ac70 a2=0 a3=ffffa52f46c0 items=0 ppid=2664 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:34:46.882000 audit[2783]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.882000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc97dd540 a2=0 a3=ffff8583c6c0 items=0 ppid=2664 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:34:46.884000 audit[2785]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.884000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0d1d8a0 a2=0 a3=ffffa63846c0 items=0 ppid=2664 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:46.886000 audit[2788]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.886000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffced87a40 a2=0 a3=ffff9b5566c0 items=0 ppid=2664 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:46.887000 audit[2789]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.887000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9ff8930 a2=0 a3=ffff7f7426c0 items=0 ppid=2664 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:34:46.889000 audit[2791]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.889000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6d356e0 a2=0 a3=ffffba7856c0 items=0 ppid=2664 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:46.892000 audit[2794]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.892000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc47f6ae0 a2=0 a3=ffffba27f6c0 items=0 ppid=2664 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:46.893000 audit[2795]: NETFILTER_CFG table=nat:91 family=10 entries=1 op=nft_register_chain pid=2795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.893000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2937ee0 a2=0 a3=ffff8f98b6c0 items=0 ppid=2664 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:34:46.895000 audit[2797]: NETFILTER_CFG table=nat:92 family=10 entries=2 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:46.895000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff59b91b0 a2=0 a3=ffffa8fb96c0 items=0 ppid=2664 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:34:46.897000 audit[2799]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:34:46.897000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe45408a0 a2=0 a3=ffff9c8ff6c0 items=0 ppid=2664 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.897000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.898000 audit[2799]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:34:46.898000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe45408a0 a2=0 a3=ffff9c8ff6c0 items=0 ppid=2664 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.898000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:48.417189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3841581121.mount: Deactivated successfully. Feb 9 18:34:49.497119 env[1353]: time="2024-02-09T18:34:49.497067481Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:49.505267 env[1353]: time="2024-02-09T18:34:49.505227957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:49.509535 env[1353]: time="2024-02-09T18:34:49.509511456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:49.514548 env[1353]: time="2024-02-09T18:34:49.514522758Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:49.515166 env[1353]: time="2024-02-09T18:34:49.515137121Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 18:34:49.519066 env[1353]: time="2024-02-09T18:34:49.519027898Z" level=info msg="CreateContainer within sandbox \"40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 18:34:49.545659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1100804701.mount: Deactivated successfully. Feb 9 18:34:49.551866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3874054381.mount: Deactivated successfully. Feb 9 18:34:49.564665 env[1353]: time="2024-02-09T18:34:49.564611701Z" level=info msg="CreateContainer within sandbox \"40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341\"" Feb 9 18:34:49.565101 env[1353]: time="2024-02-09T18:34:49.565077263Z" level=info msg="StartContainer for \"40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341\"" Feb 9 18:34:49.581570 systemd[1]: Started cri-containerd-40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341.scope. Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.593000 audit: BPF prog-id=121 op=LOAD Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2568 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633064623465333032343435643238656136616236666536643661 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2568 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633064623465333032343435643238656136616236666536643661 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.594000 audit: BPF prog-id=122 op=LOAD Feb 9 18:34:49.594000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2568 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633064623465333032343435643238656136616236666536643661 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.595000 audit: BPF prog-id=123 op=LOAD Feb 9 18:34:49.595000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2568 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633064623465333032343435643238656136616236666536643661 Feb 9 18:34:49.595000 audit: BPF prog-id=123 op=UNLOAD Feb 9 18:34:49.596000 audit: BPF prog-id=122 op=UNLOAD Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.596000 audit: BPF prog-id=124 op=LOAD Feb 9 18:34:49.596000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2568 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633064623465333032343435643238656136616236666536643661 Feb 9 18:34:49.614697 env[1353]: time="2024-02-09T18:34:49.614648523Z" level=info msg="StartContainer for \"40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341\" returns successfully" Feb 9 18:34:50.365596 kubelet[2484]: I0209 18:34:50.365553 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-w2rqj" podStartSLOduration=4.365519952 podCreationTimestamp="2024-02-09 18:34:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:47.463362607 +0000 UTC m=+17.218311204" watchObservedRunningTime="2024-02-09 18:34:50.365519952 +0000 UTC m=+20.120468549" Feb 9 18:34:50.473243 kubelet[2484]: I0209 18:34:50.473209 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-qb45c" podStartSLOduration=2.281412813 podCreationTimestamp="2024-02-09 18:34:45 +0000 UTC" firstStartedPulling="2024-02-09 18:34:46.323846354 +0000 UTC m=+16.078794951" lastFinishedPulling="2024-02-09 18:34:49.515565563 +0000 UTC m=+19.270514160" observedRunningTime="2024-02-09 18:34:50.472826901 +0000 UTC m=+20.227775498" watchObservedRunningTime="2024-02-09 18:34:50.473132022 +0000 UTC m=+20.228080619" Feb 9 18:34:52.011515 kernel: kauditd_printk_skb: 378 callbacks suppressed Feb 9 18:34:52.011647 kernel: audit: type=1325 audit(1707503692.005:1034): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.005000 audit[2840]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.005000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdfd6efd0 a2=0 a3=ffffa4dec6c0 items=0 ppid=2664 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.053908 kernel: audit: type=1300 audit(1707503692.005:1034): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdfd6efd0 a2=0 a3=ffffa4dec6c0 items=0 ppid=2664 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.054070 kernel: audit: type=1327 audit(1707503692.005:1034): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.006000 audit[2840]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.006000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdfd6efd0 a2=0 a3=ffffa4dec6c0 items=0 ppid=2664 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.109999 kernel: audit: type=1325 audit(1707503692.006:1035): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.110115 kernel: audit: type=1300 audit(1707503692.006:1035): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdfd6efd0 a2=0 a3=ffffa4dec6c0 items=0 ppid=2664 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.123606 kernel: audit: type=1327 audit(1707503692.006:1035): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.073000 audit[2842]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.073000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff2d5e950 a2=0 a3=ffff98b0b6c0 items=0 ppid=2664 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.169973 kubelet[2484]: I0209 18:34:52.169935 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:52.175217 systemd[1]: Created slice kubepods-besteffort-podf0cf281e_512e_4146_9200_82637aad5ffd.slice. Feb 9 18:34:52.177617 kernel: audit: type=1325 audit(1707503692.073:1036): table=filter:97 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.177703 kernel: audit: type=1300 audit(1707503692.073:1036): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff2d5e950 a2=0 a3=ffff98b0b6c0 items=0 ppid=2664 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.196148 kernel: audit: type=1327 audit(1707503692.073:1036): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.127000 audit[2842]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.218281 kernel: audit: type=1325 audit(1707503692.127:1037): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:52.127000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff2d5e950 a2=0 a3=ffff98b0b6c0 items=0 ppid=2664 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:52.268679 kubelet[2484]: I0209 18:34:52.268571 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:52.273885 systemd[1]: Created slice kubepods-besteffort-pod57fa523a_a2e0_483e_bd9c_5a612585798e.slice. Feb 9 18:34:52.277167 kubelet[2484]: I0209 18:34:52.277122 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zwhj\" (UniqueName: \"kubernetes.io/projected/f0cf281e-512e-4146-9200-82637aad5ffd-kube-api-access-6zwhj\") pod \"calico-typha-678bc4d657-wrnxv\" (UID: \"f0cf281e-512e-4146-9200-82637aad5ffd\") " pod="calico-system/calico-typha-678bc4d657-wrnxv" Feb 9 18:34:52.277167 kubelet[2484]: I0209 18:34:52.277168 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f0cf281e-512e-4146-9200-82637aad5ffd-tigera-ca-bundle\") pod \"calico-typha-678bc4d657-wrnxv\" (UID: \"f0cf281e-512e-4146-9200-82637aad5ffd\") " pod="calico-system/calico-typha-678bc4d657-wrnxv" Feb 9 18:34:52.277304 kubelet[2484]: I0209 18:34:52.277189 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f0cf281e-512e-4146-9200-82637aad5ffd-typha-certs\") pod \"calico-typha-678bc4d657-wrnxv\" (UID: \"f0cf281e-512e-4146-9200-82637aad5ffd\") " pod="calico-system/calico-typha-678bc4d657-wrnxv" Feb 9 18:34:52.377682 kubelet[2484]: I0209 18:34:52.377651 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/57fa523a-a2e0-483e-bd9c-5a612585798e-node-certs\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.377876 kubelet[2484]: I0209 18:34:52.377865 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-cni-bin-dir\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.377971 kubelet[2484]: I0209 18:34:52.377961 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-cni-net-dir\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378067 kubelet[2484]: I0209 18:34:52.378056 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-var-lib-calico\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378156 kubelet[2484]: I0209 18:34:52.378147 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-cni-log-dir\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378265 kubelet[2484]: I0209 18:34:52.378254 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-flexvol-driver-host\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378375 kubelet[2484]: I0209 18:34:52.378365 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-lib-modules\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378472 kubelet[2484]: I0209 18:34:52.378463 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-var-run-calico\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378572 kubelet[2484]: I0209 18:34:52.378563 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lnmwt\" (UniqueName: \"kubernetes.io/projected/57fa523a-a2e0-483e-bd9c-5a612585798e-kube-api-access-lnmwt\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378664 kubelet[2484]: I0209 18:34:52.378655 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-xtables-lock\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378765 kubelet[2484]: I0209 18:34:52.378755 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/57fa523a-a2e0-483e-bd9c-5a612585798e-tigera-ca-bundle\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.378881 kubelet[2484]: I0209 18:34:52.378870 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/57fa523a-a2e0-483e-bd9c-5a612585798e-policysync\") pod \"calico-node-7kqcf\" (UID: \"57fa523a-a2e0-483e-bd9c-5a612585798e\") " pod="calico-system/calico-node-7kqcf" Feb 9 18:34:52.395679 kubelet[2484]: I0209 18:34:52.395653 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:34:52.396113 kubelet[2484]: E0209 18:34:52.396095 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:34:52.478725 env[1353]: time="2024-02-09T18:34:52.478658848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678bc4d657-wrnxv,Uid:f0cf281e-512e-4146-9200-82637aad5ffd,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:52.480954 kubelet[2484]: E0209 18:34:52.480925 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.481096 kubelet[2484]: W0209 18:34:52.481081 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.481179 kubelet[2484]: E0209 18:34:52.481168 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.487634 kubelet[2484]: E0209 18:34:52.487580 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.487634 kubelet[2484]: W0209 18:34:52.487601 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.487960 kubelet[2484]: E0209 18:34:52.487931 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.488204 kubelet[2484]: E0209 18:34:52.488173 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.488204 kubelet[2484]: W0209 18:34:52.488187 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.488204 kubelet[2484]: E0209 18:34:52.488200 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.488646 kubelet[2484]: E0209 18:34:52.488608 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.488646 kubelet[2484]: W0209 18:34:52.488622 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.488646 kubelet[2484]: E0209 18:34:52.488641 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.489032 kubelet[2484]: E0209 18:34:52.489012 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.489032 kubelet[2484]: W0209 18:34:52.489025 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.489140 kubelet[2484]: E0209 18:34:52.489041 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.489218 kubelet[2484]: E0209 18:34:52.489202 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.489218 kubelet[2484]: W0209 18:34:52.489215 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.489296 kubelet[2484]: E0209 18:34:52.489230 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.489588 kubelet[2484]: E0209 18:34:52.489554 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.489588 kubelet[2484]: W0209 18:34:52.489568 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.489588 kubelet[2484]: E0209 18:34:52.489585 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.489761 kubelet[2484]: E0209 18:34:52.489746 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.489761 kubelet[2484]: W0209 18:34:52.489758 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.489842 kubelet[2484]: E0209 18:34:52.489821 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.490068 kubelet[2484]: E0209 18:34:52.490050 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.490068 kubelet[2484]: W0209 18:34:52.490064 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.490170 kubelet[2484]: E0209 18:34:52.490079 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.490276 kubelet[2484]: E0209 18:34:52.490260 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.490276 kubelet[2484]: W0209 18:34:52.490272 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.490354 kubelet[2484]: E0209 18:34:52.490283 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.491653 kubelet[2484]: E0209 18:34:52.491624 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.491653 kubelet[2484]: W0209 18:34:52.491641 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.491653 kubelet[2484]: E0209 18:34:52.491655 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.491849 kubelet[2484]: E0209 18:34:52.491834 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.491849 kubelet[2484]: W0209 18:34:52.491848 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.491926 kubelet[2484]: E0209 18:34:52.491859 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.492738 kubelet[2484]: E0209 18:34:52.492718 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.492738 kubelet[2484]: W0209 18:34:52.492732 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.492738 kubelet[2484]: E0209 18:34:52.492744 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.492888 kubelet[2484]: E0209 18:34:52.492871 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.492888 kubelet[2484]: W0209 18:34:52.492884 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.492888 kubelet[2484]: E0209 18:34:52.492895 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.493135 kubelet[2484]: E0209 18:34:52.493113 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.493135 kubelet[2484]: W0209 18:34:52.493125 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.493135 kubelet[2484]: E0209 18:34:52.493135 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.493280 kubelet[2484]: E0209 18:34:52.493266 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.493280 kubelet[2484]: W0209 18:34:52.493277 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.493340 kubelet[2484]: E0209 18:34:52.493286 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.493489 kubelet[2484]: E0209 18:34:52.493462 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.493489 kubelet[2484]: W0209 18:34:52.493474 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.493562 kubelet[2484]: E0209 18:34:52.493498 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.504101 kubelet[2484]: E0209 18:34:52.504076 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.504101 kubelet[2484]: W0209 18:34:52.504094 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.504101 kubelet[2484]: E0209 18:34:52.504110 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.515854 env[1353]: time="2024-02-09T18:34:52.515742045Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:52.515854 env[1353]: time="2024-02-09T18:34:52.515787365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:52.515854 env[1353]: time="2024-02-09T18:34:52.515797325Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:52.516197 env[1353]: time="2024-02-09T18:34:52.516153767Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d027be05066c9b4a91d0abd05420810b0f057f99336f5c8bc9fbf7483868234 pid=2873 runtime=io.containerd.runc.v2 Feb 9 18:34:52.530288 systemd[1]: Started cri-containerd-4d027be05066c9b4a91d0abd05420810b0f057f99336f5c8bc9fbf7483868234.scope. Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.548000 audit: BPF prog-id=125 op=LOAD Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2873 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303237626530353036366339623461393164306162643035343230 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2873 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303237626530353036366339623461393164306162643035343230 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.549000 audit: BPF prog-id=126 op=LOAD Feb 9 18:34:52.549000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2873 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303237626530353036366339623461393164306162643035343230 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.550000 audit: BPF prog-id=127 op=LOAD Feb 9 18:34:52.550000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2873 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303237626530353036366339623461393164306162643035343230 Feb 9 18:34:52.551000 audit: BPF prog-id=127 op=UNLOAD Feb 9 18:34:52.551000 audit: BPF prog-id=126 op=UNLOAD Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.551000 audit: BPF prog-id=128 op=LOAD Feb 9 18:34:52.551000 audit[2884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2873 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303237626530353036366339623461393164306162643035343230 Feb 9 18:34:52.577965 env[1353]: time="2024-02-09T18:34:52.577921468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7kqcf,Uid:57fa523a-a2e0-483e-bd9c-5a612585798e,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:52.579964 kubelet[2484]: E0209 18:34:52.579937 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.579964 kubelet[2484]: W0209 18:34:52.579957 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.580131 kubelet[2484]: E0209 18:34:52.579977 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.580131 kubelet[2484]: I0209 18:34:52.580008 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4e8ce9d0-c905-4d9e-a117-75d893b9fe9f-socket-dir\") pod \"csi-node-driver-6hpwv\" (UID: \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\") " pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:34:52.580386 kubelet[2484]: E0209 18:34:52.580369 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.580386 kubelet[2484]: W0209 18:34:52.580382 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.580501 kubelet[2484]: E0209 18:34:52.580398 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.580501 kubelet[2484]: I0209 18:34:52.580417 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4e8ce9d0-c905-4d9e-a117-75d893b9fe9f-varrun\") pod \"csi-node-driver-6hpwv\" (UID: \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\") " pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:34:52.580675 kubelet[2484]: E0209 18:34:52.580659 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.580675 kubelet[2484]: W0209 18:34:52.580672 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.580762 kubelet[2484]: E0209 18:34:52.580682 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.580863 kubelet[2484]: E0209 18:34:52.580848 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.580863 kubelet[2484]: W0209 18:34:52.580860 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.580863 kubelet[2484]: E0209 18:34:52.580871 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.581200 kubelet[2484]: E0209 18:34:52.581176 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.581200 kubelet[2484]: W0209 18:34:52.581191 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.581200 kubelet[2484]: E0209 18:34:52.581209 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.581319 kubelet[2484]: I0209 18:34:52.581227 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ccm4k\" (UniqueName: \"kubernetes.io/projected/4e8ce9d0-c905-4d9e-a117-75d893b9fe9f-kube-api-access-ccm4k\") pod \"csi-node-driver-6hpwv\" (UID: \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\") " pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:34:52.581379 kubelet[2484]: E0209 18:34:52.581361 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.581379 kubelet[2484]: W0209 18:34:52.581375 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.581451 kubelet[2484]: E0209 18:34:52.581387 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.581613 kubelet[2484]: E0209 18:34:52.581598 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.581613 kubelet[2484]: W0209 18:34:52.581609 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.581708 kubelet[2484]: E0209 18:34:52.581620 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.581789 kubelet[2484]: E0209 18:34:52.581775 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.581789 kubelet[2484]: W0209 18:34:52.581787 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.581866 kubelet[2484]: E0209 18:34:52.581797 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582009 kubelet[2484]: E0209 18:34:52.581994 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582009 kubelet[2484]: W0209 18:34:52.582004 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.582091 kubelet[2484]: E0209 18:34:52.582014 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582174 kubelet[2484]: E0209 18:34:52.582156 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582174 kubelet[2484]: W0209 18:34:52.582167 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.582260 kubelet[2484]: E0209 18:34:52.582177 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582260 kubelet[2484]: I0209 18:34:52.582194 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4e8ce9d0-c905-4d9e-a117-75d893b9fe9f-kubelet-dir\") pod \"csi-node-driver-6hpwv\" (UID: \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\") " pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:34:52.582422 kubelet[2484]: E0209 18:34:52.582401 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582422 kubelet[2484]: W0209 18:34:52.582414 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.582541 kubelet[2484]: E0209 18:34:52.582425 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582577 kubelet[2484]: E0209 18:34:52.582555 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582577 kubelet[2484]: W0209 18:34:52.582563 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.582577 kubelet[2484]: E0209 18:34:52.582573 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582739 kubelet[2484]: E0209 18:34:52.582724 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582739 kubelet[2484]: W0209 18:34:52.582734 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.582739 kubelet[2484]: E0209 18:34:52.582744 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.582847 kubelet[2484]: I0209 18:34:52.582763 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4e8ce9d0-c905-4d9e-a117-75d893b9fe9f-registration-dir\") pod \"csi-node-driver-6hpwv\" (UID: \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\") " pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:34:52.582997 kubelet[2484]: E0209 18:34:52.582982 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.582997 kubelet[2484]: W0209 18:34:52.582994 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.583081 kubelet[2484]: E0209 18:34:52.583004 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.583132 kubelet[2484]: E0209 18:34:52.583114 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.583132 kubelet[2484]: W0209 18:34:52.583126 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.583187 kubelet[2484]: E0209 18:34:52.583136 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.585388 env[1353]: time="2024-02-09T18:34:52.585347059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678bc4d657-wrnxv,Uid:f0cf281e-512e-4146-9200-82637aad5ffd,Namespace:calico-system,Attempt:0,} returns sandbox id \"4d027be05066c9b4a91d0abd05420810b0f057f99336f5c8bc9fbf7483868234\"" Feb 9 18:34:52.586824 env[1353]: time="2024-02-09T18:34:52.586796786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 18:34:52.618542 env[1353]: time="2024-02-09T18:34:52.618253719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:52.618542 env[1353]: time="2024-02-09T18:34:52.618309519Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:52.618542 env[1353]: time="2024-02-09T18:34:52.618320519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:52.620698 env[1353]: time="2024-02-09T18:34:52.620654849Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2 pid=2928 runtime=io.containerd.runc.v2 Feb 9 18:34:52.632827 systemd[1]: Started cri-containerd-55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2.scope. Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.650000 audit: BPF prog-id=129 op=LOAD Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2928 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734306566306364376435353833376336336461383134316161 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2928 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734306566306364376435353833376336336461383134316161 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit: BPF prog-id=130 op=LOAD Feb 9 18:34:52.651000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2928 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734306566306364376435353833376336336461383134316161 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit: BPF prog-id=131 op=LOAD Feb 9 18:34:52.651000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2928 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734306566306364376435353833376336336461383134316161 Feb 9 18:34:52.651000 audit: BPF prog-id=131 op=UNLOAD Feb 9 18:34:52.651000 audit: BPF prog-id=130 op=UNLOAD Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.651000 audit: BPF prog-id=132 op=LOAD Feb 9 18:34:52.651000 audit[2939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2928 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535613734306566306364376435353833376336336461383134316161 Feb 9 18:34:52.671303 env[1353]: time="2024-02-09T18:34:52.671265823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7kqcf,Uid:57fa523a-a2e0-483e-bd9c-5a612585798e,Namespace:calico-system,Attempt:0,} returns sandbox id \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\"" Feb 9 18:34:52.683376 kubelet[2484]: E0209 18:34:52.683227 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.683376 kubelet[2484]: W0209 18:34:52.683253 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.683376 kubelet[2484]: E0209 18:34:52.683272 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.683897 kubelet[2484]: E0209 18:34:52.683676 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.683897 kubelet[2484]: W0209 18:34:52.683688 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.683897 kubelet[2484]: E0209 18:34:52.683714 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.684204 kubelet[2484]: E0209 18:34:52.684052 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.684204 kubelet[2484]: W0209 18:34:52.684064 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.684204 kubelet[2484]: E0209 18:34:52.684085 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.684616 kubelet[2484]: E0209 18:34:52.684386 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.684616 kubelet[2484]: W0209 18:34:52.684398 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.684616 kubelet[2484]: E0209 18:34:52.684414 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.684889 kubelet[2484]: E0209 18:34:52.684781 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.684889 kubelet[2484]: W0209 18:34:52.684794 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.684983 kubelet[2484]: E0209 18:34:52.684907 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.685298 kubelet[2484]: E0209 18:34:52.685171 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.685298 kubelet[2484]: W0209 18:34:52.685190 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.685298 kubelet[2484]: E0209 18:34:52.685273 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.685592 kubelet[2484]: E0209 18:34:52.685473 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.685592 kubelet[2484]: W0209 18:34:52.685506 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.685592 kubelet[2484]: E0209 18:34:52.685544 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.685880 kubelet[2484]: E0209 18:34:52.685773 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.685880 kubelet[2484]: W0209 18:34:52.685786 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.685880 kubelet[2484]: E0209 18:34:52.685821 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.686149 kubelet[2484]: E0209 18:34:52.686048 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.686149 kubelet[2484]: W0209 18:34:52.686059 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.686149 kubelet[2484]: E0209 18:34:52.686094 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.686416 kubelet[2484]: E0209 18:34:52.686317 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.686416 kubelet[2484]: W0209 18:34:52.686327 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.686416 kubelet[2484]: E0209 18:34:52.686363 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.686679 kubelet[2484]: E0209 18:34:52.686586 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.686679 kubelet[2484]: W0209 18:34:52.686596 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.686679 kubelet[2484]: E0209 18:34:52.686629 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.686942 kubelet[2484]: E0209 18:34:52.686848 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.686942 kubelet[2484]: W0209 18:34:52.686859 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.686942 kubelet[2484]: E0209 18:34:52.686894 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.687160 kubelet[2484]: E0209 18:34:52.687149 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.687238 kubelet[2484]: W0209 18:34:52.687228 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.687333 kubelet[2484]: E0209 18:34:52.687310 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.688332 kubelet[2484]: E0209 18:34:52.688316 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.688439 kubelet[2484]: W0209 18:34:52.688426 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.688567 kubelet[2484]: E0209 18:34:52.688542 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.688866 kubelet[2484]: E0209 18:34:52.688853 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.688983 kubelet[2484]: W0209 18:34:52.688969 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.689110 kubelet[2484]: E0209 18:34:52.689082 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.689319 kubelet[2484]: E0209 18:34:52.689307 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.689417 kubelet[2484]: W0209 18:34:52.689396 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.689680 kubelet[2484]: E0209 18:34:52.689647 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.689925 kubelet[2484]: E0209 18:34:52.689911 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.690014 kubelet[2484]: W0209 18:34:52.690002 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.690108 kubelet[2484]: E0209 18:34:52.690087 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.690318 kubelet[2484]: E0209 18:34:52.690301 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.690402 kubelet[2484]: W0209 18:34:52.690390 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.690531 kubelet[2484]: E0209 18:34:52.690507 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.690770 kubelet[2484]: E0209 18:34:52.690757 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.690895 kubelet[2484]: W0209 18:34:52.690882 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.691012 kubelet[2484]: E0209 18:34:52.690986 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.691633 kubelet[2484]: E0209 18:34:52.691618 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.691750 kubelet[2484]: W0209 18:34:52.691736 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.691890 kubelet[2484]: E0209 18:34:52.691865 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.692228 kubelet[2484]: E0209 18:34:52.692216 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.692322 kubelet[2484]: W0209 18:34:52.692310 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.692458 kubelet[2484]: E0209 18:34:52.692432 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.692762 kubelet[2484]: E0209 18:34:52.692734 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.692875 kubelet[2484]: W0209 18:34:52.692862 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.693035 kubelet[2484]: E0209 18:34:52.693009 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.693367 kubelet[2484]: E0209 18:34:52.693338 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.693447 kubelet[2484]: W0209 18:34:52.693422 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.693611 kubelet[2484]: E0209 18:34:52.693599 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.699420 kubelet[2484]: E0209 18:34:52.699401 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.699545 kubelet[2484]: W0209 18:34:52.699531 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.699648 kubelet[2484]: E0209 18:34:52.699622 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.700172 kubelet[2484]: E0209 18:34:52.700156 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.700260 kubelet[2484]: W0209 18:34:52.700249 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.700324 kubelet[2484]: E0209 18:34:52.700315 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:52.704656 kubelet[2484]: E0209 18:34:52.704633 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:52.704774 kubelet[2484]: W0209 18:34:52.704760 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:52.704851 kubelet[2484]: E0209 18:34:52.704841 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:53.161000 audit[2990]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:53.161000 audit[2990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffca57f950 a2=0 a3=ffff882cf6c0 items=0 ppid=2664 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:53.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:53.162000 audit[2990]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:53.162000 audit[2990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffca57f950 a2=0 a3=ffff882cf6c0 items=0 ppid=2664 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:53.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:53.887916 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount228938896.mount: Deactivated successfully. Feb 9 18:34:54.358333 kubelet[2484]: E0209 18:34:54.356559 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:34:54.632871 env[1353]: time="2024-02-09T18:34:54.632760690Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:54.640300 env[1353]: time="2024-02-09T18:34:54.640258441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:54.646837 env[1353]: time="2024-02-09T18:34:54.646804828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:54.651412 env[1353]: time="2024-02-09T18:34:54.651369366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:54.652131 env[1353]: time="2024-02-09T18:34:54.652097249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 18:34:54.658562 env[1353]: time="2024-02-09T18:34:54.657452551Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:34:54.665891 env[1353]: time="2024-02-09T18:34:54.665839346Z" level=info msg="CreateContainer within sandbox \"4d027be05066c9b4a91d0abd05420810b0f057f99336f5c8bc9fbf7483868234\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:34:54.704623 env[1353]: time="2024-02-09T18:34:54.704544064Z" level=info msg="CreateContainer within sandbox \"4d027be05066c9b4a91d0abd05420810b0f057f99336f5c8bc9fbf7483868234\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"9eb03ad6c1da7cfe38a50b394a6d24f7443baa524beefe267fd564db8bbf3d69\"" Feb 9 18:34:54.705302 env[1353]: time="2024-02-09T18:34:54.705266227Z" level=info msg="StartContainer for \"9eb03ad6c1da7cfe38a50b394a6d24f7443baa524beefe267fd564db8bbf3d69\"" Feb 9 18:34:54.739730 systemd[1]: Started cri-containerd-9eb03ad6c1da7cfe38a50b394a6d24f7443baa524beefe267fd564db8bbf3d69.scope. Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.756000 audit: BPF prog-id=133 op=LOAD Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2873 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:54.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965623033616436633164613763666533386135306233393461366432 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2873 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:54.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965623033616436633164613763666533386135306233393461366432 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.757000 audit: BPF prog-id=134 op=LOAD Feb 9 18:34:54.757000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2873 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:54.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965623033616436633164613763666533386135306233393461366432 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.758000 audit: BPF prog-id=135 op=LOAD Feb 9 18:34:54.758000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2873 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:54.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965623033616436633164613763666533386135306233393461366432 Feb 9 18:34:54.759000 audit: BPF prog-id=135 op=UNLOAD Feb 9 18:34:54.759000 audit: BPF prog-id=134 op=UNLOAD Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:54.759000 audit: BPF prog-id=136 op=LOAD Feb 9 18:34:54.759000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2873 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:54.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965623033616436633164613763666533386135306233393461366432 Feb 9 18:34:54.784388 env[1353]: time="2024-02-09T18:34:54.784336871Z" level=info msg="StartContainer for \"9eb03ad6c1da7cfe38a50b394a6d24f7443baa524beefe267fd564db8bbf3d69\" returns successfully" Feb 9 18:34:55.491115 kubelet[2484]: I0209 18:34:55.491075 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-678bc4d657-wrnxv" podStartSLOduration=1.42514563 podCreationTimestamp="2024-02-09 18:34:52 +0000 UTC" firstStartedPulling="2024-02-09 18:34:52.586547784 +0000 UTC m=+22.341496341" lastFinishedPulling="2024-02-09 18:34:54.652430131 +0000 UTC m=+24.407378728" observedRunningTime="2024-02-09 18:34:55.490213934 +0000 UTC m=+25.245162531" watchObservedRunningTime="2024-02-09 18:34:55.491028017 +0000 UTC m=+25.245976614" Feb 9 18:34:55.514653 kubelet[2484]: E0209 18:34:55.514523 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.514653 kubelet[2484]: W0209 18:34:55.514545 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.514653 kubelet[2484]: E0209 18:34:55.514566 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.515087 kubelet[2484]: E0209 18:34:55.514918 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.515087 kubelet[2484]: W0209 18:34:55.514931 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.515087 kubelet[2484]: E0209 18:34:55.514946 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.515381 kubelet[2484]: E0209 18:34:55.515265 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.515381 kubelet[2484]: W0209 18:34:55.515277 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.515381 kubelet[2484]: E0209 18:34:55.515290 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.515759 kubelet[2484]: E0209 18:34:55.515650 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.515759 kubelet[2484]: W0209 18:34:55.515662 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.515759 kubelet[2484]: E0209 18:34:55.515677 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.516087 kubelet[2484]: E0209 18:34:55.516000 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.516087 kubelet[2484]: W0209 18:34:55.516011 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.516087 kubelet[2484]: E0209 18:34:55.516024 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.516454 kubelet[2484]: E0209 18:34:55.516315 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.516454 kubelet[2484]: W0209 18:34:55.516325 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.516454 kubelet[2484]: E0209 18:34:55.516338 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.516891 kubelet[2484]: E0209 18:34:55.516773 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.516891 kubelet[2484]: W0209 18:34:55.516785 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.516891 kubelet[2484]: E0209 18:34:55.516801 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.517168 kubelet[2484]: E0209 18:34:55.517070 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.517168 kubelet[2484]: W0209 18:34:55.517082 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.517168 kubelet[2484]: E0209 18:34:55.517097 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.517456 kubelet[2484]: E0209 18:34:55.517334 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.517456 kubelet[2484]: W0209 18:34:55.517346 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.517456 kubelet[2484]: E0209 18:34:55.517358 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.517760 kubelet[2484]: E0209 18:34:55.517655 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.517760 kubelet[2484]: W0209 18:34:55.517667 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.517760 kubelet[2484]: E0209 18:34:55.517680 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.518032 kubelet[2484]: E0209 18:34:55.517929 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.518032 kubelet[2484]: W0209 18:34:55.517939 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.518032 kubelet[2484]: E0209 18:34:55.517955 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.518363 kubelet[2484]: E0209 18:34:55.518200 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.518363 kubelet[2484]: W0209 18:34:55.518212 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.518363 kubelet[2484]: E0209 18:34:55.518224 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.601593 kubelet[2484]: E0209 18:34:55.601556 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.601593 kubelet[2484]: W0209 18:34:55.601578 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.601593 kubelet[2484]: E0209 18:34:55.601599 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.601853 kubelet[2484]: E0209 18:34:55.601835 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.601853 kubelet[2484]: W0209 18:34:55.601849 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.601937 kubelet[2484]: E0209 18:34:55.601872 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.602078 kubelet[2484]: E0209 18:34:55.602062 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.602078 kubelet[2484]: W0209 18:34:55.602075 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.602159 kubelet[2484]: E0209 18:34:55.602094 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.602301 kubelet[2484]: E0209 18:34:55.602284 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.602301 kubelet[2484]: W0209 18:34:55.602297 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.602377 kubelet[2484]: E0209 18:34:55.602313 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.602496 kubelet[2484]: E0209 18:34:55.602456 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.602496 kubelet[2484]: W0209 18:34:55.602470 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.602496 kubelet[2484]: E0209 18:34:55.602494 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.602642 kubelet[2484]: E0209 18:34:55.602615 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.602642 kubelet[2484]: W0209 18:34:55.602635 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.602712 kubelet[2484]: E0209 18:34:55.602654 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.602827 kubelet[2484]: E0209 18:34:55.602800 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.602827 kubelet[2484]: W0209 18:34:55.602821 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.602898 kubelet[2484]: E0209 18:34:55.602888 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603157 kubelet[2484]: E0209 18:34:55.603139 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603157 kubelet[2484]: W0209 18:34:55.603154 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.603333 kubelet[2484]: E0209 18:34:55.603274 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603333 kubelet[2484]: E0209 18:34:55.603291 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603333 kubelet[2484]: W0209 18:34:55.603299 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.603333 kubelet[2484]: E0209 18:34:55.603316 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603462 kubelet[2484]: E0209 18:34:55.603415 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603462 kubelet[2484]: W0209 18:34:55.603430 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.603462 kubelet[2484]: E0209 18:34:55.603443 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603619 kubelet[2484]: E0209 18:34:55.603603 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603619 kubelet[2484]: W0209 18:34:55.603616 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.603702 kubelet[2484]: E0209 18:34:55.603630 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603782 kubelet[2484]: E0209 18:34:55.603762 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603782 kubelet[2484]: W0209 18:34:55.603776 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.603847 kubelet[2484]: E0209 18:34:55.603787 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.603969 kubelet[2484]: E0209 18:34:55.603931 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.603969 kubelet[2484]: W0209 18:34:55.603954 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.604024 kubelet[2484]: E0209 18:34:55.603970 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.604385 kubelet[2484]: E0209 18:34:55.604220 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.604385 kubelet[2484]: W0209 18:34:55.604233 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.604385 kubelet[2484]: E0209 18:34:55.604259 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.604729 kubelet[2484]: E0209 18:34:55.604558 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.604729 kubelet[2484]: W0209 18:34:55.604570 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.604729 kubelet[2484]: E0209 18:34:55.604583 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.605167 kubelet[2484]: E0209 18:34:55.604873 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.605167 kubelet[2484]: W0209 18:34:55.604886 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.605167 kubelet[2484]: E0209 18:34:55.604898 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.605454 kubelet[2484]: E0209 18:34:55.605303 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.605454 kubelet[2484]: W0209 18:34:55.605315 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.605454 kubelet[2484]: E0209 18:34:55.605328 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:55.605700 kubelet[2484]: E0209 18:34:55.605639 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:55.605700 kubelet[2484]: W0209 18:34:55.605651 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:55.605700 kubelet[2484]: E0209 18:34:55.605664 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.356805 kubelet[2484]: E0209 18:34:56.356768 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:34:56.475258 kubelet[2484]: I0209 18:34:56.475229 2484 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:34:56.524971 kubelet[2484]: E0209 18:34:56.524945 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.525324 kubelet[2484]: W0209 18:34:56.525308 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.525397 kubelet[2484]: E0209 18:34:56.525386 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.525618 kubelet[2484]: E0209 18:34:56.525607 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.525701 kubelet[2484]: W0209 18:34:56.525690 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.525755 kubelet[2484]: E0209 18:34:56.525747 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.525952 kubelet[2484]: E0209 18:34:56.525942 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.526031 kubelet[2484]: W0209 18:34:56.526021 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.526088 kubelet[2484]: E0209 18:34:56.526079 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.526304 kubelet[2484]: E0209 18:34:56.526293 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.526382 kubelet[2484]: W0209 18:34:56.526371 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.526434 kubelet[2484]: E0209 18:34:56.526426 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.526639 kubelet[2484]: E0209 18:34:56.526628 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.526731 kubelet[2484]: W0209 18:34:56.526720 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.526790 kubelet[2484]: E0209 18:34:56.526781 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.526973 kubelet[2484]: E0209 18:34:56.526963 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.527041 kubelet[2484]: W0209 18:34:56.527031 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.527092 kubelet[2484]: E0209 18:34:56.527084 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.527325 kubelet[2484]: E0209 18:34:56.527313 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.527449 kubelet[2484]: W0209 18:34:56.527437 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.527538 kubelet[2484]: E0209 18:34:56.527528 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.527740 kubelet[2484]: E0209 18:34:56.527730 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.527810 kubelet[2484]: W0209 18:34:56.527801 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.527867 kubelet[2484]: E0209 18:34:56.527859 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.528059 kubelet[2484]: E0209 18:34:56.528049 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.528135 kubelet[2484]: W0209 18:34:56.528125 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.528187 kubelet[2484]: E0209 18:34:56.528179 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.528384 kubelet[2484]: E0209 18:34:56.528374 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.528459 kubelet[2484]: W0209 18:34:56.528449 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.528539 kubelet[2484]: E0209 18:34:56.528529 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.528731 kubelet[2484]: E0209 18:34:56.528721 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.528807 kubelet[2484]: W0209 18:34:56.528797 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.528863 kubelet[2484]: E0209 18:34:56.528855 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.529064 kubelet[2484]: E0209 18:34:56.529054 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.529129 kubelet[2484]: W0209 18:34:56.529119 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.529244 kubelet[2484]: E0209 18:34:56.529233 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.608419 kubelet[2484]: E0209 18:34:56.608327 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.608596 kubelet[2484]: W0209 18:34:56.608578 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.608665 kubelet[2484]: E0209 18:34:56.608655 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.610276 kubelet[2484]: E0209 18:34:56.610259 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.610366 kubelet[2484]: W0209 18:34:56.610354 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.610451 kubelet[2484]: E0209 18:34:56.610441 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.610668 kubelet[2484]: E0209 18:34:56.610650 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.610668 kubelet[2484]: W0209 18:34:56.610666 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.610768 kubelet[2484]: E0209 18:34:56.610688 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.610859 kubelet[2484]: E0209 18:34:56.610843 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.610859 kubelet[2484]: W0209 18:34:56.610856 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.610930 kubelet[2484]: E0209 18:34:56.610876 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.611025 kubelet[2484]: E0209 18:34:56.611008 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.611025 kubelet[2484]: W0209 18:34:56.611022 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.611089 kubelet[2484]: E0209 18:34:56.611033 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.611205 kubelet[2484]: E0209 18:34:56.611184 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.611205 kubelet[2484]: W0209 18:34:56.611199 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.611270 kubelet[2484]: E0209 18:34:56.611214 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.611464 kubelet[2484]: E0209 18:34:56.611452 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.611584 kubelet[2484]: W0209 18:34:56.611568 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.611660 kubelet[2484]: E0209 18:34:56.611650 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.611856 kubelet[2484]: E0209 18:34:56.611836 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.611856 kubelet[2484]: W0209 18:34:56.611851 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.611945 kubelet[2484]: E0209 18:34:56.611867 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.612031 kubelet[2484]: E0209 18:34:56.612013 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.612031 kubelet[2484]: W0209 18:34:56.612027 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.612101 kubelet[2484]: E0209 18:34:56.612038 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.612172 kubelet[2484]: E0209 18:34:56.612154 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.612172 kubelet[2484]: W0209 18:34:56.612168 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.612242 kubelet[2484]: E0209 18:34:56.612184 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.612344 kubelet[2484]: E0209 18:34:56.612322 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.612344 kubelet[2484]: W0209 18:34:56.612336 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.612402 kubelet[2484]: E0209 18:34:56.612347 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.612617 kubelet[2484]: E0209 18:34:56.612604 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.612712 kubelet[2484]: W0209 18:34:56.612698 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.612827 kubelet[2484]: E0209 18:34:56.612814 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.613596 kubelet[2484]: E0209 18:34:56.613569 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.613596 kubelet[2484]: W0209 18:34:56.613592 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.613705 kubelet[2484]: E0209 18:34:56.613617 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.613961 kubelet[2484]: E0209 18:34:56.613781 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.613961 kubelet[2484]: W0209 18:34:56.613794 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.613961 kubelet[2484]: E0209 18:34:56.613805 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.613961 kubelet[2484]: E0209 18:34:56.613920 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.613961 kubelet[2484]: W0209 18:34:56.613927 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.613961 kubelet[2484]: E0209 18:34:56.613936 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.614113 kubelet[2484]: E0209 18:34:56.614064 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.614113 kubelet[2484]: W0209 18:34:56.614073 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.614113 kubelet[2484]: E0209 18:34:56.614082 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.614353 kubelet[2484]: E0209 18:34:56.614339 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.614426 kubelet[2484]: W0209 18:34:56.614414 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.614517 kubelet[2484]: E0209 18:34:56.614506 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.614768 kubelet[2484]: E0209 18:34:56.614746 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:56.614768 kubelet[2484]: W0209 18:34:56.614764 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:56.614846 kubelet[2484]: E0209 18:34:56.614778 2484 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:56.986647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3941893355.mount: Deactivated successfully. Feb 9 18:34:57.135776 env[1353]: time="2024-02-09T18:34:57.135728219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:57.143812 env[1353]: time="2024-02-09T18:34:57.143777971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:57.149392 env[1353]: time="2024-02-09T18:34:57.149360792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:57.153970 env[1353]: time="2024-02-09T18:34:57.153940970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:57.154429 env[1353]: time="2024-02-09T18:34:57.154399892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 18:34:57.156463 env[1353]: time="2024-02-09T18:34:57.156422980Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:34:57.185868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2035013203.mount: Deactivated successfully. Feb 9 18:34:57.202234 env[1353]: time="2024-02-09T18:34:57.202183399Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd\"" Feb 9 18:34:57.203160 env[1353]: time="2024-02-09T18:34:57.203126923Z" level=info msg="StartContainer for \"950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd\"" Feb 9 18:34:57.224718 systemd[1]: Started cri-containerd-950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd.scope. Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.245531 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 18:34:57.245607 kernel: audit: type=1400 audit(1707503697.239:1094): avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2928 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:57.289944 kernel: audit: type=1300 audit(1707503697.239:1094): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2928 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:57.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306131326637313030666265363435623062313064373864656161 Feb 9 18:34:57.316911 kernel: audit: type=1327 audit(1707503697.239:1094): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306131326637313030666265363435623062313064373864656161 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.334953 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.353275 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.370556 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.372421 systemd[1]: cri-containerd-950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd.scope: Deactivated successfully. Feb 9 18:34:57.389809 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.393931 env[1353]: time="2024-02-09T18:34:57.393897350Z" level=info msg="StartContainer for \"950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd\" returns successfully" Feb 9 18:34:57.410425 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.430702 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.432172 kernel: audit: type=1400 audit(1707503697.239:1095): avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit: BPF prog-id=137 op=LOAD Feb 9 18:34:57.239000 audit[3100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2928 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:57.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306131326637313030666265363435623062313064373864656161 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit: BPF prog-id=138 op=LOAD Feb 9 18:34:57.239000 audit[3100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2928 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:57.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306131326637313030666265363435623062313064373864656161 Feb 9 18:34:57.239000 audit: BPF prog-id=138 op=UNLOAD Feb 9 18:34:57.239000 audit: BPF prog-id=137 op=UNLOAD Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:57.239000 audit: BPF prog-id=139 op=LOAD Feb 9 18:34:57.239000 audit[3100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2928 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:57.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306131326637313030666265363435623062313064373864656161 Feb 9 18:34:57.392000 audit: BPF prog-id=139 op=UNLOAD Feb 9 18:34:57.889873 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd-rootfs.mount: Deactivated successfully. Feb 9 18:34:58.344865 env[1353]: time="2024-02-09T18:34:58.344641615Z" level=info msg="shim disconnected" id=950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd Feb 9 18:34:58.344865 env[1353]: time="2024-02-09T18:34:58.344712095Z" level=warning msg="cleaning up after shim disconnected" id=950a12f7100fbe645b0b10d78deaa9465c65994b7f0fad28231da0fcee9a06cd namespace=k8s.io Feb 9 18:34:58.344865 env[1353]: time="2024-02-09T18:34:58.344723935Z" level=info msg="cleaning up dead shim" Feb 9 18:34:58.351421 env[1353]: time="2024-02-09T18:34:58.351379241Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:34:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3141 runtime=io.containerd.runc.v2\n" Feb 9 18:34:58.357634 kubelet[2484]: E0209 18:34:58.357595 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:34:58.483238 env[1353]: time="2024-02-09T18:34:58.483190390Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:34:59.753377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2816704426.mount: Deactivated successfully. Feb 9 18:35:00.356567 kubelet[2484]: E0209 18:35:00.356535 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:35:01.949122 env[1353]: time="2024-02-09T18:35:01.949067814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:01.954549 env[1353]: time="2024-02-09T18:35:01.954515394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:01.958763 env[1353]: time="2024-02-09T18:35:01.958735529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:01.962542 env[1353]: time="2024-02-09T18:35:01.962516583Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:01.962996 env[1353]: time="2024-02-09T18:35:01.962970705Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 18:35:01.965619 env[1353]: time="2024-02-09T18:35:01.965580355Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:35:01.989652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount32134372.mount: Deactivated successfully. Feb 9 18:35:02.004396 env[1353]: time="2024-02-09T18:35:02.004355258Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d\"" Feb 9 18:35:02.006811 env[1353]: time="2024-02-09T18:35:02.005194701Z" level=info msg="StartContainer for \"8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d\"" Feb 9 18:35:02.030552 systemd[1]: Started cri-containerd-8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d.scope. Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2928 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:02.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663566353039396331343232626130363430313466626138623432 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.045000 audit: BPF prog-id=140 op=LOAD Feb 9 18:35:02.045000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2928 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:02.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663566353039396331343232626130363430313466626138623432 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit: BPF prog-id=141 op=LOAD Feb 9 18:35:02.046000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2928 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:02.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663566353039396331343232626130363430313466626138623432 Feb 9 18:35:02.046000 audit: BPF prog-id=141 op=UNLOAD Feb 9 18:35:02.046000 audit: BPF prog-id=140 op=UNLOAD Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:02.046000 audit: BPF prog-id=142 op=LOAD Feb 9 18:35:02.046000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2928 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:02.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866663566353039396331343232626130363430313466626138623432 Feb 9 18:35:02.067555 env[1353]: time="2024-02-09T18:35:02.067510168Z" level=info msg="StartContainer for \"8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d\" returns successfully" Feb 9 18:35:02.356569 kubelet[2484]: E0209 18:35:02.356544 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:35:02.987662 systemd[1]: run-containerd-runc-k8s.io-8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d-runc.yLZ81I.mount: Deactivated successfully. Feb 9 18:35:03.316779 env[1353]: time="2024-02-09T18:35:03.316668553Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:35:03.319008 systemd[1]: cri-containerd-8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d.scope: Deactivated successfully. Feb 9 18:35:03.332513 kernel: kauditd_printk_skb: 77 callbacks suppressed Feb 9 18:35:03.332724 kernel: audit: type=1334 audit(1707503703.324:1107): prog-id=142 op=UNLOAD Feb 9 18:35:03.324000 audit: BPF prog-id=142 op=UNLOAD Feb 9 18:35:03.347926 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d-rootfs.mount: Deactivated successfully. Feb 9 18:35:03.369892 kubelet[2484]: I0209 18:35:03.369867 2484 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.394455 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.400017 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.410014 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.551737 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/29b137ea-760c-47b3-b7bf-0d9a2d4bf827-tigera-ca-bundle\") pod \"calico-kube-controllers-c6cdf994c-czmgq\" (UID: \"29b137ea-760c-47b3-b7bf-0d9a2d4bf827\") " pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.551779 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/890357e6-1ea3-4f53-8cd3-ec94904a465c-config-volume\") pod \"coredns-5d78c9869d-5jll2\" (UID: \"890357e6-1ea3-4f53-8cd3-ec94904a465c\") " pod="kube-system/coredns-5d78c9869d-5jll2" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.551804 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8db6dccf-6f52-4813-9071-d41ebb177d4f-config-volume\") pod \"coredns-5d78c9869d-bjk2r\" (UID: \"8db6dccf-6f52-4813-9071-d41ebb177d4f\") " pod="kube-system/coredns-5d78c9869d-bjk2r" Feb 9 18:35:03.774925 kubelet[2484]: I0209 18:35:03.551826 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xw4ng\" (UniqueName: \"kubernetes.io/projected/8db6dccf-6f52-4813-9071-d41ebb177d4f-kube-api-access-xw4ng\") pod \"coredns-5d78c9869d-bjk2r\" (UID: \"8db6dccf-6f52-4813-9071-d41ebb177d4f\") " pod="kube-system/coredns-5d78c9869d-bjk2r" Feb 9 18:35:03.401372 systemd[1]: Created slice kubepods-burstable-pod890357e6_1ea3_4f53_8cd3_ec94904a465c.slice. Feb 9 18:35:03.775272 kubelet[2484]: I0209 18:35:03.551852 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fc7vf\" (UniqueName: \"kubernetes.io/projected/890357e6-1ea3-4f53-8cd3-ec94904a465c-kube-api-access-fc7vf\") pod \"coredns-5d78c9869d-5jll2\" (UID: \"890357e6-1ea3-4f53-8cd3-ec94904a465c\") " pod="kube-system/coredns-5d78c9869d-5jll2" Feb 9 18:35:03.775272 kubelet[2484]: I0209 18:35:03.551872 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gccns\" (UniqueName: \"kubernetes.io/projected/29b137ea-760c-47b3-b7bf-0d9a2d4bf827-kube-api-access-gccns\") pod \"calico-kube-controllers-c6cdf994c-czmgq\" (UID: \"29b137ea-760c-47b3-b7bf-0d9a2d4bf827\") " pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" Feb 9 18:35:03.407464 systemd[1]: Created slice kubepods-burstable-pod8db6dccf_6f52_4813_9071_d41ebb177d4f.slice. Feb 9 18:35:03.415895 systemd[1]: Created slice kubepods-besteffort-pod29b137ea_760c_47b3_b7bf_0d9a2d4bf827.slice. Feb 9 18:35:04.077302 env[1353]: time="2024-02-09T18:35:04.076860727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bjk2r,Uid:8db6dccf-6f52-4813-9071-d41ebb177d4f,Namespace:kube-system,Attempt:0,}" Feb 9 18:35:04.077937 env[1353]: time="2024-02-09T18:35:04.077603810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5jll2,Uid:890357e6-1ea3-4f53-8cd3-ec94904a465c,Namespace:kube-system,Attempt:0,}" Feb 9 18:35:04.077937 env[1353]: time="2024-02-09T18:35:04.077810090Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c6cdf994c-czmgq,Uid:29b137ea-760c-47b3-b7bf-0d9a2d4bf827,Namespace:calico-system,Attempt:0,}" Feb 9 18:35:04.361879 systemd[1]: Created slice kubepods-besteffort-pod4e8ce9d0_c905_4d9e_a117_75d893b9fe9f.slice. Feb 9 18:35:04.364406 env[1353]: time="2024-02-09T18:35:04.364362589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6hpwv,Uid:4e8ce9d0-c905-4d9e-a117-75d893b9fe9f,Namespace:calico-system,Attempt:0,}" Feb 9 18:35:04.488520 env[1353]: time="2024-02-09T18:35:04.488298469Z" level=info msg="shim disconnected" id=8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d Feb 9 18:35:04.488520 env[1353]: time="2024-02-09T18:35:04.488338190Z" level=warning msg="cleaning up after shim disconnected" id=8ff5f5099c1422ba064014fba8b42c01924d981225e1ff69e03e2a5257f9e08d namespace=k8s.io Feb 9 18:35:04.488520 env[1353]: time="2024-02-09T18:35:04.488347150Z" level=info msg="cleaning up dead shim" Feb 9 18:35:04.497672 env[1353]: time="2024-02-09T18:35:04.497637063Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:35:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3220 runtime=io.containerd.runc.v2\n" Feb 9 18:35:04.668803 env[1353]: time="2024-02-09T18:35:04.668454550Z" level=error msg="Failed to destroy network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.672264 env[1353]: time="2024-02-09T18:35:04.672217363Z" level=error msg="encountered an error cleaning up failed sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.672436 env[1353]: time="2024-02-09T18:35:04.672409564Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5jll2,Uid:890357e6-1ea3-4f53-8cd3-ec94904a465c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.672921 kubelet[2484]: E0209 18:35:04.672888 2484 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.673172 kubelet[2484]: E0209 18:35:04.672951 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5jll2" Feb 9 18:35:04.673172 kubelet[2484]: E0209 18:35:04.672986 2484 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5jll2" Feb 9 18:35:04.673172 kubelet[2484]: E0209 18:35:04.673069 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-5jll2_kube-system(890357e6-1ea3-4f53-8cd3-ec94904a465c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-5jll2_kube-system(890357e6-1ea3-4f53-8cd3-ec94904a465c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5jll2" podUID=890357e6-1ea3-4f53-8cd3-ec94904a465c Feb 9 18:35:04.690406 env[1353]: time="2024-02-09T18:35:04.690350868Z" level=error msg="Failed to destroy network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.690925 env[1353]: time="2024-02-09T18:35:04.690891310Z" level=error msg="encountered an error cleaning up failed sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.691101 env[1353]: time="2024-02-09T18:35:04.691071150Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c6cdf994c-czmgq,Uid:29b137ea-760c-47b3-b7bf-0d9a2d4bf827,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.691490 kubelet[2484]: E0209 18:35:04.691452 2484 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.691573 kubelet[2484]: E0209 18:35:04.691514 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" Feb 9 18:35:04.691573 kubelet[2484]: E0209 18:35:04.691533 2484 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" Feb 9 18:35:04.691632 kubelet[2484]: E0209 18:35:04.691599 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c6cdf994c-czmgq_calico-system(29b137ea-760c-47b3-b7bf-0d9a2d4bf827)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c6cdf994c-czmgq_calico-system(29b137ea-760c-47b3-b7bf-0d9a2d4bf827)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" podUID=29b137ea-760c-47b3-b7bf-0d9a2d4bf827 Feb 9 18:35:04.692894 env[1353]: time="2024-02-09T18:35:04.692857797Z" level=error msg="Failed to destroy network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.693319 env[1353]: time="2024-02-09T18:35:04.693285918Z" level=error msg="encountered an error cleaning up failed sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.693443 env[1353]: time="2024-02-09T18:35:04.693416999Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bjk2r,Uid:8db6dccf-6f52-4813-9071-d41ebb177d4f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.693918 kubelet[2484]: E0209 18:35:04.693667 2484 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.693918 kubelet[2484]: E0209 18:35:04.693835 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-bjk2r" Feb 9 18:35:04.693918 kubelet[2484]: E0209 18:35:04.693853 2484 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-bjk2r" Feb 9 18:35:04.694504 kubelet[2484]: E0209 18:35:04.693899 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-bjk2r_kube-system(8db6dccf-6f52-4813-9071-d41ebb177d4f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-bjk2r_kube-system(8db6dccf-6f52-4813-9071-d41ebb177d4f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-bjk2r" podUID=8db6dccf-6f52-4813-9071-d41ebb177d4f Feb 9 18:35:04.706189 env[1353]: time="2024-02-09T18:35:04.706140804Z" level=error msg="Failed to destroy network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.706655 env[1353]: time="2024-02-09T18:35:04.706620325Z" level=error msg="encountered an error cleaning up failed sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.706789 env[1353]: time="2024-02-09T18:35:04.706761646Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6hpwv,Uid:4e8ce9d0-c905-4d9e-a117-75d893b9fe9f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.707105 kubelet[2484]: E0209 18:35:04.707073 2484 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:04.707193 kubelet[2484]: E0209 18:35:04.707140 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:35:04.707193 kubelet[2484]: E0209 18:35:04.707163 2484 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6hpwv" Feb 9 18:35:04.707253 kubelet[2484]: E0209 18:35:04.707212 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6hpwv_calico-system(4e8ce9d0-c905-4d9e-a117-75d893b9fe9f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6hpwv_calico-system(4e8ce9d0-c905-4d9e-a117-75d893b9fe9f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:35:05.498514 env[1353]: time="2024-02-09T18:35:05.498462997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:35:05.498935 kubelet[2484]: I0209 18:35:05.498897 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:05.499412 env[1353]: time="2024-02-09T18:35:05.499377681Z" level=info msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" Feb 9 18:35:05.500589 kubelet[2484]: I0209 18:35:05.500560 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:05.500979 env[1353]: time="2024-02-09T18:35:05.500953206Z" level=info msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" Feb 9 18:35:05.503607 kubelet[2484]: I0209 18:35:05.503584 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:05.503979 env[1353]: time="2024-02-09T18:35:05.503952057Z" level=info msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" Feb 9 18:35:05.504947 kubelet[2484]: I0209 18:35:05.504843 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:05.505281 env[1353]: time="2024-02-09T18:35:05.505255781Z" level=info msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" Feb 9 18:35:05.565807 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e-shm.mount: Deactivated successfully. Feb 9 18:35:05.565895 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538-shm.mount: Deactivated successfully. Feb 9 18:35:05.565942 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76-shm.mount: Deactivated successfully. Feb 9 18:35:05.565991 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb-shm.mount: Deactivated successfully. Feb 9 18:35:05.569860 env[1353]: time="2024-02-09T18:35:05.569789488Z" level=error msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" failed" error="failed to destroy network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:05.570231 kubelet[2484]: E0209 18:35:05.570187 2484 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:05.570306 kubelet[2484]: E0209 18:35:05.570260 2484 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb} Feb 9 18:35:05.570336 kubelet[2484]: E0209 18:35:05.570313 2484 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"890357e6-1ea3-4f53-8cd3-ec94904a465c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:35:05.570402 kubelet[2484]: E0209 18:35:05.570344 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"890357e6-1ea3-4f53-8cd3-ec94904a465c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5jll2" podUID=890357e6-1ea3-4f53-8cd3-ec94904a465c Feb 9 18:35:05.570912 env[1353]: time="2024-02-09T18:35:05.570863291Z" level=error msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" failed" error="failed to destroy network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:05.571074 kubelet[2484]: E0209 18:35:05.571052 2484 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:05.571120 kubelet[2484]: E0209 18:35:05.571081 2484 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76} Feb 9 18:35:05.571120 kubelet[2484]: E0209 18:35:05.571111 2484 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8db6dccf-6f52-4813-9071-d41ebb177d4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:35:05.571186 kubelet[2484]: E0209 18:35:05.571148 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8db6dccf-6f52-4813-9071-d41ebb177d4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-bjk2r" podUID=8db6dccf-6f52-4813-9071-d41ebb177d4f Feb 9 18:35:05.572606 env[1353]: time="2024-02-09T18:35:05.572558137Z" level=error msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" failed" error="failed to destroy network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:05.572775 kubelet[2484]: E0209 18:35:05.572752 2484 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:05.572816 kubelet[2484]: E0209 18:35:05.572782 2484 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538} Feb 9 18:35:05.572843 kubelet[2484]: E0209 18:35:05.572822 2484 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29b137ea-760c-47b3-b7bf-0d9a2d4bf827\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:35:05.572887 kubelet[2484]: E0209 18:35:05.572846 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29b137ea-760c-47b3-b7bf-0d9a2d4bf827\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" podUID=29b137ea-760c-47b3-b7bf-0d9a2d4bf827 Feb 9 18:35:05.577733 env[1353]: time="2024-02-09T18:35:05.577676835Z" level=error msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" failed" error="failed to destroy network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:35:05.577886 kubelet[2484]: E0209 18:35:05.577846 2484 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:05.577934 kubelet[2484]: E0209 18:35:05.577893 2484 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e} Feb 9 18:35:05.577934 kubelet[2484]: E0209 18:35:05.577924 2484 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:35:05.578000 kubelet[2484]: E0209 18:35:05.577966 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6hpwv" podUID=4e8ce9d0-c905-4d9e-a117-75d893b9fe9f Feb 9 18:35:10.409204 kubelet[2484]: I0209 18:35:10.408616 2484 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:35:10.453000 audit[3442]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:10.453000 audit[3442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe28f0600 a2=0 a3=ffff83cdc6c0 items=0 ppid=2664 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:10.495784 kernel: audit: type=1325 audit(1707503710.453:1108): table=filter:101 family=2 entries=15 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:10.495873 kernel: audit: type=1300 audit(1707503710.453:1108): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe28f0600 a2=0 a3=ffff83cdc6c0 items=0 ppid=2664 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:10.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:10.520520 kernel: audit: type=1327 audit(1707503710.453:1108): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:10.520602 kernel: audit: type=1325 audit(1707503710.453:1109): table=nat:102 family=2 entries=19 op=nft_register_chain pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:10.453000 audit[3442]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:10.453000 audit[3442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe28f0600 a2=0 a3=ffff83cdc6c0 items=0 ppid=2664 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:10.564323 kernel: audit: type=1300 audit(1707503710.453:1109): arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe28f0600 a2=0 a3=ffff83cdc6c0 items=0 ppid=2664 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:10.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:10.580057 kernel: audit: type=1327 audit(1707503710.453:1109): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:12.461551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4080579518.mount: Deactivated successfully. Feb 9 18:35:12.820727 env[1353]: time="2024-02-09T18:35:12.820371581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:12.826786 env[1353]: time="2024-02-09T18:35:12.826750842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:12.831402 env[1353]: time="2024-02-09T18:35:12.831374417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:12.835307 env[1353]: time="2024-02-09T18:35:12.835267229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:12.835850 env[1353]: time="2024-02-09T18:35:12.835822391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 18:35:12.850954 env[1353]: time="2024-02-09T18:35:12.850919560Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:35:12.881965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4068619118.mount: Deactivated successfully. Feb 9 18:35:12.902342 env[1353]: time="2024-02-09T18:35:12.902293166Z" level=info msg="CreateContainer within sandbox \"55a740ef0cd7d55837c63da8141aae70d10b1145dec4597bc752fff7b5ab3ef2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631\"" Feb 9 18:35:12.904552 env[1353]: time="2024-02-09T18:35:12.903155568Z" level=info msg="StartContainer for \"ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631\"" Feb 9 18:35:12.918564 systemd[1]: Started cri-containerd-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631.scope. Feb 9 18:35:12.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.935000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2928 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:12.980703 kernel: audit: type=1400 audit(1707503712.935:1110): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.981050 kernel: audit: type=1300 audit(1707503712.935:1110): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2928 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:12.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666656566313234636266373763616637623238336230613561626532 Feb 9 18:35:13.006274 kernel: audit: type=1327 audit(1707503712.935:1110): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666656566313234636266373763616637623238336230613561626532 Feb 9 18:35:13.009007 kernel: audit: type=1400 audit(1707503712.936:1111): avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.936000 audit: BPF prog-id=143 op=LOAD Feb 9 18:35:12.936000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2928 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:12.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666656566313234636266373763616637623238336230613561626532 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit: BPF prog-id=144 op=LOAD Feb 9 18:35:12.953000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2928 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:12.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666656566313234636266373763616637623238336230613561626532 Feb 9 18:35:12.953000 audit: BPF prog-id=144 op=UNLOAD Feb 9 18:35:12.953000 audit: BPF prog-id=143 op=UNLOAD Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:12.953000 audit: BPF prog-id=145 op=LOAD Feb 9 18:35:12.953000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2928 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:12.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666656566313234636266373763616637623238336230613561626532 Feb 9 18:35:13.036928 env[1353]: time="2024-02-09T18:35:13.036878559Z" level=info msg="StartContainer for \"ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631\" returns successfully" Feb 9 18:35:13.314938 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:35:13.315095 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:35:13.547235 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.P9mPSJ.mount: Deactivated successfully. Feb 9 18:35:13.569089 kubelet[2484]: I0209 18:35:13.568981 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-7kqcf" podStartSLOduration=1.405383533 podCreationTimestamp="2024-02-09 18:34:52 +0000 UTC" firstStartedPulling="2024-02-09 18:34:52.672530988 +0000 UTC m=+22.427479585" lastFinishedPulling="2024-02-09 18:35:12.836088152 +0000 UTC m=+42.591036749" observedRunningTime="2024-02-09 18:35:13.567634853 +0000 UTC m=+43.322583450" watchObservedRunningTime="2024-02-09 18:35:13.568940697 +0000 UTC m=+43.323889294" Feb 9 18:35:14.546067 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.D6hLtO.mount: Deactivated successfully. Feb 9 18:35:14.648000 audit[3596]: AVC avc: denied { write } for pid=3596 comm="tee" name="fd" dev="proc" ino=24487 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.650000 audit[3598]: AVC avc: denied { write } for pid=3598 comm="tee" name="fd" dev="proc" ino=24490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.650000 audit[3598]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb56795d a2=241 a3=1b6 items=1 ppid=3562 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.650000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:35:14.650000 audit: PATH item=0 name="/dev/fd/63" inode=24482 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.650000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.648000 audit[3596]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd490f95e a2=241 a3=1b6 items=1 ppid=3561 pid=3596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.648000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:35:14.648000 audit: PATH item=0 name="/dev/fd/63" inode=24708 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.648000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.666000 audit[3614]: AVC avc: denied { write } for pid=3614 comm="tee" name="fd" dev="proc" ino=24505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.666000 audit[3614]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5fbb96e a2=241 a3=1b6 items=1 ppid=3576 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.666000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:35:14.666000 audit: PATH item=0 name="/dev/fd/63" inode=24499 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.669000 audit[3616]: AVC avc: denied { write } for pid=3616 comm="tee" name="fd" dev="proc" ino=24509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.669000 audit[3616]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff456096f a2=241 a3=1b6 items=1 ppid=3572 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.669000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:35:14.669000 audit: PATH item=0 name="/dev/fd/63" inode=24502 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.669000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.722000 audit[3625]: AVC avc: denied { write } for pid=3625 comm="tee" name="fd" dev="proc" ino=24523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.722000 audit[3625]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdbf7796d a2=241 a3=1b6 items=1 ppid=3581 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.722000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:35:14.722000 audit: PATH item=0 name="/dev/fd/63" inode=24740 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.740000 audit[3627]: AVC avc: denied { write } for pid=3627 comm="tee" name="fd" dev="proc" ino=24745 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.740000 audit[3627]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc141d96d a2=241 a3=1b6 items=1 ppid=3573 pid=3627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.740000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:35:14.740000 audit: PATH item=0 name="/dev/fd/63" inode=24741 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.740000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:14.801000 audit[3634]: AVC avc: denied { write } for pid=3634 comm="tee" name="fd" dev="proc" ino=24554 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:35:14.801000 audit[3634]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7a2b96d a2=241 a3=1b6 items=1 ppid=3575 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:14.801000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:35:14.801000 audit: PATH item=0 name="/dev/fd/63" inode=24750 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:14.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit: BPF prog-id=146 op=LOAD Feb 9 18:35:15.057000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc5947c8 a2=70 a3=0 items=0 ppid=3574 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.057000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:35:15.057000 audit: BPF prog-id=146 op=UNLOAD Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit: BPF prog-id=147 op=LOAD Feb 9 18:35:15.057000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffc5947c8 a2=70 a3=4a174c items=0 ppid=3574 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.057000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:35:15.057000 audit: BPF prog-id=147 op=UNLOAD Feb 9 18:35:15.057000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.057000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffffc5947f8 a2=70 a3=2627779f items=0 ppid=3574 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.057000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.059000 audit: BPF prog-id=148 op=LOAD Feb 9 18:35:15.059000 audit[3703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffffc594748 a2=70 a3=262777b9 items=0 ppid=3574 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.059000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:35:15.073000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.073000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca03dbb8 a2=70 a3=0 items=0 ppid=3574 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.073000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:35:15.074000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:15.074000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffca03da98 a2=70 a3=2 items=0 ppid=3574 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.074000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:35:15.079000 audit: BPF prog-id=148 op=UNLOAD Feb 9 18:35:15.193000 audit[3732]: NETFILTER_CFG table=mangle:103 family=2 entries=19 op=nft_register_chain pid=3732 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:15.193000 audit[3732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe2f1d3f0 a2=0 a3=ffff907d3fa8 items=0 ppid=3574 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.193000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:15.198000 audit[3731]: NETFILTER_CFG table=nat:104 family=2 entries=16 op=nft_register_chain pid=3731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:15.198000 audit[3731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc2758460 a2=0 a3=ffffadfc3fa8 items=0 ppid=3574 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.198000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:15.200000 audit[3734]: NETFILTER_CFG table=filter:105 family=2 entries=39 op=nft_register_chain pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:15.200000 audit[3734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffdf4f27d0 a2=0 a3=ffff86b10fa8 items=0 ppid=3574 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:15.210000 audit[3730]: NETFILTER_CFG table=raw:106 family=2 entries=19 op=nft_register_chain pid=3730 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:15.210000 audit[3730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe691b8b0 a2=0 a3=ffff83bdffa8 items=0 ppid=3574 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:15.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:15.959942 systemd-networkd[1506]: vxlan.calico: Link UP Feb 9 18:35:15.959948 systemd-networkd[1506]: vxlan.calico: Gained carrier Feb 9 18:35:17.190712 systemd-networkd[1506]: vxlan.calico: Gained IPv6LL Feb 9 18:35:17.357209 env[1353]: time="2024-02-09T18:35:17.357151264Z" level=info msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" Feb 9 18:35:17.357588 env[1353]: time="2024-02-09T18:35:17.357155064Z" level=info msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.427 [INFO][3775] k8s.go 578: Cleaning up netns ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.427 [INFO][3775] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" iface="eth0" netns="/var/run/netns/cni-9910ce85-b853-d668-88ca-46465d44f57a" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.428 [INFO][3775] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" iface="eth0" netns="/var/run/netns/cni-9910ce85-b853-d668-88ca-46465d44f57a" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.428 [INFO][3775] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" iface="eth0" netns="/var/run/netns/cni-9910ce85-b853-d668-88ca-46465d44f57a" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.428 [INFO][3775] k8s.go 585: Releasing IP address(es) ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.428 [INFO][3775] utils.go 188: Calico CNI releasing IP address ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.461 [INFO][3787] ipam_plugin.go 415: Releasing address using handleID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.461 [INFO][3787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.461 [INFO][3787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.473 [WARNING][3787] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.473 [INFO][3787] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.475 [INFO][3787] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:17.477871 env[1353]: 2024-02-09 18:35:17.476 [INFO][3775] k8s.go 591: Teardown processing complete. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:17.480567 env[1353]: time="2024-02-09T18:35:17.480525042Z" level=info msg="TearDown network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" successfully" Feb 9 18:35:17.480705 env[1353]: time="2024-02-09T18:35:17.480687443Z" level=info msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" returns successfully" Feb 9 18:35:17.482134 systemd[1]: run-netns-cni\x2d9910ce85\x2db853\x2dd668\x2d88ca\x2d46465d44f57a.mount: Deactivated successfully. Feb 9 18:35:17.483274 env[1353]: time="2024-02-09T18:35:17.483240570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bjk2r,Uid:8db6dccf-6f52-4813-9071-d41ebb177d4f,Namespace:kube-system,Attempt:1,}" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.441 [INFO][3776] k8s.go 578: Cleaning up netns ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.442 [INFO][3776] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" iface="eth0" netns="/var/run/netns/cni-4ba969ac-34d9-aeca-2bca-03eb49202bed" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.442 [INFO][3776] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" iface="eth0" netns="/var/run/netns/cni-4ba969ac-34d9-aeca-2bca-03eb49202bed" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.442 [INFO][3776] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" iface="eth0" netns="/var/run/netns/cni-4ba969ac-34d9-aeca-2bca-03eb49202bed" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.442 [INFO][3776] k8s.go 585: Releasing IP address(es) ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.442 [INFO][3776] utils.go 188: Calico CNI releasing IP address ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.482 [INFO][3792] ipam_plugin.go 415: Releasing address using handleID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.482 [INFO][3792] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.482 [INFO][3792] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.492 [WARNING][3792] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.492 [INFO][3792] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.494 [INFO][3792] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:17.497869 env[1353]: 2024-02-09 18:35:17.496 [INFO][3776] k8s.go 591: Teardown processing complete. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:17.501684 env[1353]: time="2024-02-09T18:35:17.501643667Z" level=info msg="TearDown network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" successfully" Feb 9 18:35:17.501807 env[1353]: time="2024-02-09T18:35:17.501788867Z" level=info msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" returns successfully" Feb 9 18:35:17.502278 systemd[1]: run-netns-cni\x2d4ba969ac\x2d34d9\x2daeca\x2d2bca\x2d03eb49202bed.mount: Deactivated successfully. Feb 9 18:35:17.503883 env[1353]: time="2024-02-09T18:35:17.503851794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5jll2,Uid:890357e6-1ea3-4f53-8cd3-ec94904a465c,Namespace:kube-system,Attempt:1,}" Feb 9 18:35:17.684394 systemd-networkd[1506]: cali4e70c18984c: Link UP Feb 9 18:35:17.698790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:35:17.698985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e70c18984c: link becomes ready Feb 9 18:35:17.700933 systemd-networkd[1506]: cali4e70c18984c: Gained carrier Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.593 [INFO][3800] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0 coredns-5d78c9869d- kube-system 8db6dccf-6f52-4813-9071-d41ebb177d4f 713 0 2024-02-09 18:34:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 coredns-5d78c9869d-bjk2r eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4e70c18984c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.593 [INFO][3800] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.633 [INFO][3822] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" HandleID="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.646 [INFO][3822] ipam_plugin.go 268: Auto assigning IP ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" HandleID="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b2e60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-9ade464be9", "pod":"coredns-5d78c9869d-bjk2r", "timestamp":"2024-02-09 18:35:17.633540351 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.646 [INFO][3822] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.646 [INFO][3822] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.646 [INFO][3822] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.647 [INFO][3822] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.651 [INFO][3822] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.657 [INFO][3822] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.660 [INFO][3822] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.663 [INFO][3822] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.663 [INFO][3822] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.665 [INFO][3822] ipam.go 1682: Creating new handle: k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.670 [INFO][3822] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.678 [INFO][3822] ipam.go 1216: Successfully claimed IPs: [192.168.5.1/26] block=192.168.5.0/26 handle="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.679 [INFO][3822] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.1/26] handle="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.679 [INFO][3822] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:17.721191 env[1353]: 2024-02-09 18:35:17.679 [INFO][3822] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.1/26] IPv6=[] ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" HandleID="k8s-pod-network.3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.681 [INFO][3800] k8s.go 385: Populated endpoint ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8db6dccf-6f52-4813-9071-d41ebb177d4f", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"coredns-5d78c9869d-bjk2r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e70c18984c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.681 [INFO][3800] k8s.go 386: Calico CNI using IPs: [192.168.5.1/32] ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.681 [INFO][3800] dataplane_linux.go 68: Setting the host side veth name to cali4e70c18984c ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.703 [INFO][3800] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.704 [INFO][3800] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8db6dccf-6f52-4813-9071-d41ebb177d4f", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba", Pod:"coredns-5d78c9869d-bjk2r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e70c18984c", MAC:"12:64:f4:e4:06:9a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:17.721859 env[1353]: 2024-02-09 18:35:17.717 [INFO][3800] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba" Namespace="kube-system" Pod="coredns-5d78c9869d-bjk2r" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:17.762910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b8beb9e953: link becomes ready Feb 9 18:35:17.762220 systemd-networkd[1506]: cali6b8beb9e953: Link UP Feb 9 18:35:17.762429 systemd-networkd[1506]: cali6b8beb9e953: Gained carrier Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.623 [INFO][3810] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0 coredns-5d78c9869d- kube-system 890357e6-1ea3-4f53-8cd3-ec94904a465c 714 0 2024-02-09 18:34:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 coredns-5d78c9869d-5jll2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6b8beb9e953 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.624 [INFO][3810] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.693 [INFO][3831] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" HandleID="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.712 [INFO][3831] ipam_plugin.go 268: Auto assigning IP ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" HandleID="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b5930), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-9ade464be9", "pod":"coredns-5d78c9869d-5jll2", "timestamp":"2024-02-09 18:35:17.693894695 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.712 [INFO][3831] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.712 [INFO][3831] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.712 [INFO][3831] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.713 [INFO][3831] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.727 [INFO][3831] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.734 [INFO][3831] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.736 [INFO][3831] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.739 [INFO][3831] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.739 [INFO][3831] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.740 [INFO][3831] ipam.go 1682: Creating new handle: k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58 Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.744 [INFO][3831] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.750 [INFO][3831] ipam.go 1216: Successfully claimed IPs: [192.168.5.2/26] block=192.168.5.0/26 handle="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.750 [INFO][3831] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.2/26] handle="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.751 [INFO][3831] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:17.784032 env[1353]: 2024-02-09 18:35:17.751 [INFO][3831] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.2/26] IPv6=[] ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" HandleID="k8s-pod-network.d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.839044 kernel: kauditd_printk_skb: 135 callbacks suppressed Feb 9 18:35:17.839094 kernel: audit: type=1325 audit(1707503717.789:1136): table=filter:107 family=2 entries=36 op=nft_register_chain pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:17.839117 kernel: audit: type=1300 audit(1707503717.789:1136): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffeb4b4790 a2=0 a3=ffffb94edfa8 items=0 ppid=3574 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:17.789000 audit[3853]: NETFILTER_CFG table=filter:107 family=2 entries=36 op=nft_register_chain pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:17.789000 audit[3853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffeb4b4790 a2=0 a3=ffffb94edfa8 items=0 ppid=3574 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.752 [INFO][3810] k8s.go 385: Populated endpoint ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"890357e6-1ea3-4f53-8cd3-ec94904a465c", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"coredns-5d78c9869d-5jll2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b8beb9e953", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.752 [INFO][3810] k8s.go 386: Calico CNI using IPs: [192.168.5.2/32] ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.752 [INFO][3810] dataplane_linux.go 68: Setting the host side veth name to cali6b8beb9e953 ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.764 [INFO][3810] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.767 [INFO][3810] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"890357e6-1ea3-4f53-8cd3-ec94904a465c", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58", Pod:"coredns-5d78c9869d-5jll2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b8beb9e953", MAC:"1e:6e:be:ea:e7:67", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:17.839307 env[1353]: 2024-02-09 18:35:17.781 [INFO][3810] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58" Namespace="kube-system" Pod="coredns-5d78c9869d-5jll2" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:17.789000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:17.856214 kernel: audit: type=1327 audit(1707503717.789:1136): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:17.819000 audit[3864]: NETFILTER_CFG table=filter:108 family=2 entries=30 op=nft_register_chain pid=3864 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:17.871790 kernel: audit: type=1325 audit(1707503717.819:1137): table=filter:108 family=2 entries=30 op=nft_register_chain pid=3864 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:17.819000 audit[3864]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffdc5b3980 a2=0 a3=ffffb1981fa8 items=0 ppid=3574 pid=3864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:17.901126 kernel: audit: type=1300 audit(1707503717.819:1137): arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffdc5b3980 a2=0 a3=ffffb1981fa8 items=0 ppid=3574 pid=3864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:17.819000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:17.918442 kernel: audit: type=1327 audit(1707503717.819:1137): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:18.030146 env[1353]: time="2024-02-09T18:35:18.029157761Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:18.030146 env[1353]: time="2024-02-09T18:35:18.029242321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:18.030146 env[1353]: time="2024-02-09T18:35:18.029269122Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:18.030146 env[1353]: time="2024-02-09T18:35:18.029858363Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba pid=3871 runtime=io.containerd.runc.v2 Feb 9 18:35:18.041160 systemd[1]: Started cri-containerd-3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba.scope. Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095446 kernel: audit: type=1400 audit(1707503718.053:1138): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095580 kernel: audit: type=1400 audit(1707503718.053:1139): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.115079 kernel: audit: type=1400 audit(1707503718.053:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.139554 kernel: audit: type=1400 audit(1707503718.053:1141): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.072000 audit: BPF prog-id=149 op=LOAD Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3871 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383835623238363130353831343766333332303232623665316135 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3871 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383835623238363130353831343766333332303232623665316135 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.077000 audit: BPF prog-id=150 op=LOAD Feb 9 18:35:18.077000 audit[3883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3871 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383835623238363130353831343766333332303232623665316135 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit: BPF prog-id=151 op=LOAD Feb 9 18:35:18.095000 audit[3883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3871 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383835623238363130353831343766333332303232623665316135 Feb 9 18:35:18.095000 audit: BPF prog-id=151 op=UNLOAD Feb 9 18:35:18.095000 audit: BPF prog-id=150 op=UNLOAD Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.095000 audit: BPF prog-id=152 op=LOAD Feb 9 18:35:18.095000 audit[3883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3871 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383835623238363130353831343766333332303232623665316135 Feb 9 18:35:18.153667 env[1353]: time="2024-02-09T18:35:18.153615379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bjk2r,Uid:8db6dccf-6f52-4813-9071-d41ebb177d4f,Namespace:kube-system,Attempt:1,} returns sandbox id \"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba\"" Feb 9 18:35:18.157317 env[1353]: time="2024-02-09T18:35:18.157282790Z" level=info msg="CreateContainer within sandbox \"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:35:18.358984 env[1353]: time="2024-02-09T18:35:18.358945841Z" level=info msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.402 [INFO][3919] k8s.go 578: Cleaning up netns ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.402 [INFO][3919] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" iface="eth0" netns="/var/run/netns/cni-dcda18db-6dff-c5a4-a38a-0a927b18a4c3" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.402 [INFO][3919] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" iface="eth0" netns="/var/run/netns/cni-dcda18db-6dff-c5a4-a38a-0a927b18a4c3" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.402 [INFO][3919] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" iface="eth0" netns="/var/run/netns/cni-dcda18db-6dff-c5a4-a38a-0a927b18a4c3" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.402 [INFO][3919] k8s.go 585: Releasing IP address(es) ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.403 [INFO][3919] utils.go 188: Calico CNI releasing IP address ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.425 [INFO][3925] ipam_plugin.go 415: Releasing address using handleID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.425 [INFO][3925] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.425 [INFO][3925] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.434 [WARNING][3925] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.434 [INFO][3925] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.436 [INFO][3925] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:18.438937 env[1353]: 2024-02-09 18:35:18.437 [INFO][3919] k8s.go 591: Teardown processing complete. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:18.439366 env[1353]: time="2024-02-09T18:35:18.439108364Z" level=info msg="TearDown network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" successfully" Feb 9 18:35:18.439366 env[1353]: time="2024-02-09T18:35:18.439146484Z" level=info msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" returns successfully" Feb 9 18:35:18.439824 env[1353]: time="2024-02-09T18:35:18.439798126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6hpwv,Uid:4e8ce9d0-c905-4d9e-a117-75d893b9fe9f,Namespace:calico-system,Attempt:1,}" Feb 9 18:35:18.481337 systemd[1]: run-netns-cni\x2ddcda18db\x2d6dff\x2dc5a4\x2da38a\x2d0a927b18a4c3.mount: Deactivated successfully. Feb 9 18:35:18.683913 env[1353]: time="2024-02-09T18:35:18.683145544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:18.683913 env[1353]: time="2024-02-09T18:35:18.683209024Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:18.683913 env[1353]: time="2024-02-09T18:35:18.683224984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:18.684955 env[1353]: time="2024-02-09T18:35:18.684546588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58 pid=3938 runtime=io.containerd.runc.v2 Feb 9 18:35:18.703132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1979623303.mount: Deactivated successfully. Feb 9 18:35:18.715950 systemd[1]: Started cri-containerd-d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58.scope. Feb 9 18:35:18.736013 env[1353]: time="2024-02-09T18:35:18.735960744Z" level=info msg="CreateContainer within sandbox \"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6551ca282d292fd968916cc704d814b58e21b747320a3436548832ce939e2e38\"" Feb 9 18:35:18.736777 env[1353]: time="2024-02-09T18:35:18.736750427Z" level=info msg="StartContainer for \"6551ca282d292fd968916cc704d814b58e21b747320a3436548832ce939e2e38\"" Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.737000 audit: BPF prog-id=153 op=LOAD Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3938 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636566333530343037353632333337646434356531636134383264 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3938 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636566333530343037353632333337646434356531636134383264 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.738000 audit: BPF prog-id=154 op=LOAD Feb 9 18:35:18.738000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3938 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636566333530343037353632333337646434356531636134383264 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit: BPF prog-id=155 op=LOAD Feb 9 18:35:18.739000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3938 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636566333530343037353632333337646434356531636134383264 Feb 9 18:35:18.739000 audit: BPF prog-id=155 op=UNLOAD Feb 9 18:35:18.739000 audit: BPF prog-id=154 op=UNLOAD Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { perfmon } for pid=3949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit[3949]: AVC avc: denied { bpf } for pid=3949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.739000 audit: BPF prog-id=156 op=LOAD Feb 9 18:35:18.739000 audit[3949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3938 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435636566333530343037353632333337646434356531636134383264 Feb 9 18:35:18.774510 systemd[1]: Started cri-containerd-6551ca282d292fd968916cc704d814b58e21b747320a3436548832ce939e2e38.scope. Feb 9 18:35:18.795300 env[1353]: time="2024-02-09T18:35:18.795241804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5jll2,Uid:890357e6-1ea3-4f53-8cd3-ec94904a465c,Namespace:kube-system,Attempt:1,} returns sandbox id \"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58\"" Feb 9 18:35:18.798760 env[1353]: time="2024-02-09T18:35:18.798720854Z" level=info msg="CreateContainer within sandbox \"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.801000 audit: BPF prog-id=157 op=LOAD Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3871 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353163613238326432393266643936383931366363373034643831 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3871 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353163613238326432393266643936383931366363373034643831 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit: BPF prog-id=158 op=LOAD Feb 9 18:35:18.804000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3871 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353163613238326432393266643936383931366363373034643831 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.804000 audit: BPF prog-id=159 op=LOAD Feb 9 18:35:18.804000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3871 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353163613238326432393266643936383931366363373034643831 Feb 9 18:35:18.805000 audit: BPF prog-id=159 op=UNLOAD Feb 9 18:35:18.805000 audit: BPF prog-id=158 op=UNLOAD Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { perfmon } for pid=3987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit[3987]: AVC avc: denied { bpf } for pid=3987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.805000 audit: BPF prog-id=160 op=LOAD Feb 9 18:35:18.805000 audit[3987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3871 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353163613238326432393266643936383931366363373034643831 Feb 9 18:35:18.890022 env[1353]: time="2024-02-09T18:35:18.889977571Z" level=info msg="StartContainer for \"6551ca282d292fd968916cc704d814b58e21b747320a3436548832ce939e2e38\" returns successfully" Feb 9 18:35:18.926235 systemd-networkd[1506]: cali719da6aedf1: Link UP Feb 9 18:35:18.940445 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:35:18.940603 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali719da6aedf1: link becomes ready Feb 9 18:35:18.941116 env[1353]: time="2024-02-09T18:35:18.940904846Z" level=info msg="CreateContainer within sandbox \"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6c7c6437e600726db1db823066c6ff49960dbc5aa190a9a4231ea052429d9ad5\"" Feb 9 18:35:18.943837 systemd-networkd[1506]: cali719da6aedf1: Gained carrier Feb 9 18:35:18.944692 env[1353]: time="2024-02-09T18:35:18.944658657Z" level=info msg="StartContainer for \"6c7c6437e600726db1db823066c6ff49960dbc5aa190a9a4231ea052429d9ad5\"" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.813 [INFO][3969] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0 csi-node-driver- calico-system 4e8ce9d0-c905-4d9e-a117-75d893b9fe9f 725 0 2024-02-09 18:34:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 csi-node-driver-6hpwv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali719da6aedf1 [] []}} ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.813 [INFO][3969] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.854 [INFO][4018] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" HandleID="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.868 [INFO][4018] ipam_plugin.go 268: Auto assigning IP ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" HandleID="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004ff380), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-9ade464be9", "pod":"csi-node-driver-6hpwv", "timestamp":"2024-02-09 18:35:18.854175343 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.887 [INFO][4018] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.888 [INFO][4018] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.888 [INFO][4018] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.891 [INFO][4018] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.899 [INFO][4018] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.903 [INFO][4018] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.905 [INFO][4018] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.907 [INFO][4018] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.907 [INFO][4018] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.909 [INFO][4018] ipam.go 1682: Creating new handle: k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.912 [INFO][4018] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.916 [INFO][4018] ipam.go 1216: Successfully claimed IPs: [192.168.5.3/26] block=192.168.5.0/26 handle="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.916 [INFO][4018] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.3/26] handle="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.918 [INFO][4018] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:18.957581 env[1353]: 2024-02-09 18:35:18.918 [INFO][4018] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.3/26] IPv6=[] ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" HandleID="k8s-pod-network.5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.919 [INFO][3969] k8s.go 385: Populated endpoint ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"csi-node-driver-6hpwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali719da6aedf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.919 [INFO][3969] k8s.go 386: Calico CNI using IPs: [192.168.5.3/32] ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.919 [INFO][3969] dataplane_linux.go 68: Setting the host side veth name to cali719da6aedf1 ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.946 [INFO][3969] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.946 [INFO][3969] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e", Pod:"csi-node-driver-6hpwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali719da6aedf1", MAC:"ea:42:af:0a:50:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:18.958226 env[1353]: 2024-02-09 18:35:18.955 [INFO][3969] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e" Namespace="calico-system" Pod="csi-node-driver-6hpwv" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:18.976922 systemd[1]: Started cri-containerd-6c7c6437e600726db1db823066c6ff49960dbc5aa190a9a4231ea052429d9ad5.scope. Feb 9 18:35:18.990405 env[1353]: time="2024-02-09T18:35:18.989292392Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:18.990405 env[1353]: time="2024-02-09T18:35:18.989349512Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:18.990405 env[1353]: time="2024-02-09T18:35:18.989360833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:18.990405 env[1353]: time="2024-02-09T18:35:18.989525313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e pid=4073 runtime=io.containerd.runc.v2 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.992000 audit: BPF prog-id=161 op=LOAD Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3938 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663376336343337653630303732366462316462383233303636633666 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3938 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663376336343337653630303732366462316462383233303636633666 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.993000 audit: BPF prog-id=162 op=LOAD Feb 9 18:35:18.993000 audit[4043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3938 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663376336343337653630303732366462316462383233303636633666 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.994000 audit: BPF prog-id=163 op=LOAD Feb 9 18:35:18.994000 audit[4043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3938 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663376336343337653630303732366462316462383233303636633666 Feb 9 18:35:18.994000 audit: BPF prog-id=163 op=UNLOAD Feb 9 18:35:18.994000 audit: BPF prog-id=162 op=UNLOAD Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:18.995000 audit: BPF prog-id=164 op=LOAD Feb 9 18:35:18.995000 audit[4043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3938 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:18.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663376336343337653630303732366462316462383233303636633666 Feb 9 18:35:19.015778 systemd[1]: Started cri-containerd-5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e.scope. Feb 9 18:35:19.019386 env[1353]: time="2024-02-09T18:35:19.019348603Z" level=info msg="StartContainer for \"6c7c6437e600726db1db823066c6ff49960dbc5aa190a9a4231ea052429d9ad5\" returns successfully" Feb 9 18:35:19.044000 audit[4104]: NETFILTER_CFG table=filter:109 family=2 entries=44 op=nft_register_chain pid=4104 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:19.044000 audit[4104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffd1aabf30 a2=0 a3=ffffb272efa8 items=0 ppid=3574 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.044000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit: BPF prog-id=165 op=LOAD Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343636393863303233663236633562303833323732663639633136 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343636393863303233663236633562303833323732663639633136 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit: BPF prog-id=166 op=LOAD Feb 9 18:35:19.053000 audit[4083]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343636393863303233663236633562303833323732663639633136 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.053000 audit: BPF prog-id=167 op=LOAD Feb 9 18:35:19.053000 audit[4083]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343636393863303233663236633562303833323732663639633136 Feb 9 18:35:19.054000 audit: BPF prog-id=167 op=UNLOAD Feb 9 18:35:19.054000 audit: BPF prog-id=166 op=UNLOAD Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:19.054000 audit: BPF prog-id=168 op=LOAD Feb 9 18:35:19.054000 audit[4083]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343636393863303233663236633562303833323732663639633136 Feb 9 18:35:19.068683 env[1353]: time="2024-02-09T18:35:19.068345510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6hpwv,Uid:4e8ce9d0-c905-4d9e-a117-75d893b9fe9f,Namespace:calico-system,Attempt:1,} returns sandbox id \"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e\"" Feb 9 18:35:19.070308 env[1353]: time="2024-02-09T18:35:19.070282916Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:35:19.174912 systemd-networkd[1506]: cali4e70c18984c: Gained IPv6LL Feb 9 18:35:19.482971 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2074197038.mount: Deactivated successfully. Feb 9 18:35:19.558586 systemd-networkd[1506]: cali6b8beb9e953: Gained IPv6LL Feb 9 18:35:19.563304 kubelet[2484]: I0209 18:35:19.563228 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-bjk2r" podStartSLOduration=34.563192476 podCreationTimestamp="2024-02-09 18:34:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:35:19.562821115 +0000 UTC m=+49.317769672" watchObservedRunningTime="2024-02-09 18:35:19.563192476 +0000 UTC m=+49.318141073" Feb 9 18:35:19.591000 audit[4121]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=4121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:19.591000 audit[4121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffcd6b2a90 a2=0 a3=ffffa6abb6c0 items=0 ppid=2664 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:19.592000 audit[4121]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:19.592000 audit[4121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffcd6b2a90 a2=0 a3=ffffa6abb6c0 items=0 ppid=2664 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:19.601000 audit[4123]: NETFILTER_CFG table=filter:112 family=2 entries=11 op=nft_register_rule pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:19.601000 audit[4123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc5afc1d0 a2=0 a3=ffff91a9b6c0 items=0 ppid=2664 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:19.602000 audit[4123]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:19.602000 audit[4123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffc5afc1d0 a2=0 a3=ffff91a9b6c0 items=0 ppid=2664 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:19.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:20.358232 env[1353]: time="2024-02-09T18:35:20.358194893Z" level=info msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" Feb 9 18:35:20.406091 kubelet[2484]: I0209 18:35:20.405543 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-5jll2" podStartSLOduration=35.405502874 podCreationTimestamp="2024-02-09 18:34:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:35:19.589165634 +0000 UTC m=+49.344114191" watchObservedRunningTime="2024-02-09 18:35:20.405502874 +0000 UTC m=+50.160451471" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.408 [INFO][4146] k8s.go 578: Cleaning up netns ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.408 [INFO][4146] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" iface="eth0" netns="/var/run/netns/cni-eed9c093-fd79-149e-ae20-a6d2dc29d320" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.408 [INFO][4146] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" iface="eth0" netns="/var/run/netns/cni-eed9c093-fd79-149e-ae20-a6d2dc29d320" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.409 [INFO][4146] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" iface="eth0" netns="/var/run/netns/cni-eed9c093-fd79-149e-ae20-a6d2dc29d320" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.409 [INFO][4146] k8s.go 585: Releasing IP address(es) ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.409 [INFO][4146] utils.go 188: Calico CNI releasing IP address ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.427 [INFO][4152] ipam_plugin.go 415: Releasing address using handleID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.427 [INFO][4152] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.427 [INFO][4152] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.442 [WARNING][4152] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.442 [INFO][4152] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.443 [INFO][4152] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:20.446120 env[1353]: 2024-02-09 18:35:20.444 [INFO][4146] k8s.go 591: Teardown processing complete. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:20.447633 env[1353]: time="2024-02-09T18:35:20.447592719Z" level=info msg="TearDown network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" successfully" Feb 9 18:35:20.447722 env[1353]: time="2024-02-09T18:35:20.447706559Z" level=info msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" returns successfully" Feb 9 18:35:20.448412 env[1353]: time="2024-02-09T18:35:20.448383241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c6cdf994c-czmgq,Uid:29b137ea-760c-47b3-b7bf-0d9a2d4bf827,Namespace:calico-system,Attempt:1,}" Feb 9 18:35:20.450115 systemd[1]: run-netns-cni\x2deed9c093\x2dfd79\x2d149e\x2dae20\x2da6d2dc29d320.mount: Deactivated successfully. Feb 9 18:35:20.454594 systemd-networkd[1506]: cali719da6aedf1: Gained IPv6LL Feb 9 18:35:20.624000 audit[4169]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:20.624000 audit[4169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe3e9c730 a2=0 a3=ffff9616f6c0 items=0 ppid=2664 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:20.651000 audit[4169]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:20.651000 audit[4169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffe3e9c730 a2=0 a3=ffff9616f6c0 items=0 ppid=2664 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:20.740024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:35:20.740131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali67713a1ea04: link becomes ready Feb 9 18:35:20.725663 systemd-networkd[1506]: cali67713a1ea04: Link UP Feb 9 18:35:20.739332 systemd-networkd[1506]: cali67713a1ea04: Gained carrier Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.631 [INFO][4158] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0 calico-kube-controllers-c6cdf994c- calico-system 29b137ea-760c-47b3-b7bf-0d9a2d4bf827 752 0 2024-02-09 18:34:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c6cdf994c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 calico-kube-controllers-c6cdf994c-czmgq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali67713a1ea04 [] []}} ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.631 [INFO][4158] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.684 [INFO][4173] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" HandleID="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.696 [INFO][4173] ipam_plugin.go 268: Auto assigning IP ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" HandleID="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316810), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-9ade464be9", "pod":"calico-kube-controllers-c6cdf994c-czmgq", "timestamp":"2024-02-09 18:35:20.684287703 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.696 [INFO][4173] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.696 [INFO][4173] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.696 [INFO][4173] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.697 [INFO][4173] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.701 [INFO][4173] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.706 [INFO][4173] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.708 [INFO][4173] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.710 [INFO][4173] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.710 [INFO][4173] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.711 [INFO][4173] ipam.go 1682: Creating new handle: k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519 Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.715 [INFO][4173] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.721 [INFO][4173] ipam.go 1216: Successfully claimed IPs: [192.168.5.4/26] block=192.168.5.0/26 handle="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.721 [INFO][4173] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.4/26] handle="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.721 [INFO][4173] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:20.759141 env[1353]: 2024-02-09 18:35:20.721 [INFO][4173] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.4/26] IPv6=[] ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" HandleID="k8s-pod-network.848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.724 [INFO][4158] k8s.go 385: Populated endpoint ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0", GenerateName:"calico-kube-controllers-c6cdf994c-", Namespace:"calico-system", SelfLink:"", UID:"29b137ea-760c-47b3-b7bf-0d9a2d4bf827", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c6cdf994c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"calico-kube-controllers-c6cdf994c-czmgq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali67713a1ea04", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.724 [INFO][4158] k8s.go 386: Calico CNI using IPs: [192.168.5.4/32] ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.724 [INFO][4158] dataplane_linux.go 68: Setting the host side veth name to cali67713a1ea04 ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.746 [INFO][4158] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.748 [INFO][4158] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0", GenerateName:"calico-kube-controllers-c6cdf994c-", Namespace:"calico-system", SelfLink:"", UID:"29b137ea-760c-47b3-b7bf-0d9a2d4bf827", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c6cdf994c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519", Pod:"calico-kube-controllers-c6cdf994c-czmgq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali67713a1ea04", MAC:"32:0b:9d:8e:c1:4f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:20.759772 env[1353]: 2024-02-09 18:35:20.757 [INFO][4158] k8s.go 491: Wrote updated endpoint to datastore ContainerID="848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519" Namespace="calico-system" Pod="calico-kube-controllers-c6cdf994c-czmgq" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:20.777000 audit[4194]: NETFILTER_CFG table=filter:116 family=2 entries=48 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:20.777000 audit[4194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23548 a0=3 a1=ffffcf764720 a2=0 a3=ffffbb98dfa8 items=0 ppid=3574 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.777000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:20.792951 env[1353]: time="2024-02-09T18:35:20.792883426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:20.793223 env[1353]: time="2024-02-09T18:35:20.793196347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:20.793391 env[1353]: time="2024-02-09T18:35:20.793366067Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:20.793661 env[1353]: time="2024-02-09T18:35:20.793631388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519 pid=4202 runtime=io.containerd.runc.v2 Feb 9 18:35:20.795199 env[1353]: time="2024-02-09T18:35:20.795168953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:20.806340 env[1353]: time="2024-02-09T18:35:20.806290826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:20.816290 env[1353]: time="2024-02-09T18:35:20.816235096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:20.821770 env[1353]: time="2024-02-09T18:35:20.821676352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 18:35:20.822298 env[1353]: time="2024-02-09T18:35:20.822265433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:20.826085 env[1353]: time="2024-02-09T18:35:20.826048725Z" level=info msg="CreateContainer within sandbox \"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:35:20.826691 systemd[1]: Started cri-containerd-848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519.scope. Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.840000 audit: BPF prog-id=169 op=LOAD Feb 9 18:35:20.841000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.841000 audit[4214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4202 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383234346132383164336361633165626130636531303461636136 Feb 9 18:35:20.841000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.841000 audit[4214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4202 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383234346132383164336361633165626130636531303461636136 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit: BPF prog-id=170 op=LOAD Feb 9 18:35:20.842000 audit[4214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4202 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383234346132383164336361633165626130636531303461636136 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.842000 audit: BPF prog-id=171 op=LOAD Feb 9 18:35:20.842000 audit[4214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4202 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383234346132383164336361633165626130636531303461636136 Feb 9 18:35:20.843000 audit: BPF prog-id=171 op=UNLOAD Feb 9 18:35:20.843000 audit: BPF prog-id=170 op=UNLOAD Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.843000 audit: BPF prog-id=172 op=LOAD Feb 9 18:35:20.843000 audit[4214]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4202 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383234346132383164336361633165626130636531303461636136 Feb 9 18:35:20.863711 env[1353]: time="2024-02-09T18:35:20.863669957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c6cdf994c-czmgq,Uid:29b137ea-760c-47b3-b7bf-0d9a2d4bf827,Namespace:calico-system,Attempt:1,} returns sandbox id \"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519\"" Feb 9 18:35:20.865727 env[1353]: time="2024-02-09T18:35:20.865695803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 18:35:20.881509 env[1353]: time="2024-02-09T18:35:20.880691127Z" level=info msg="CreateContainer within sandbox \"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3d1dc77b9dde5d533f62617d14715c83e1f88257d9414b8fedc66b794817115f\"" Feb 9 18:35:20.883830 env[1353]: time="2024-02-09T18:35:20.882865814Z" level=info msg="StartContainer for \"3d1dc77b9dde5d533f62617d14715c83e1f88257d9414b8fedc66b794817115f\"" Feb 9 18:35:20.899425 systemd[1]: Started cri-containerd-3d1dc77b9dde5d533f62617d14715c83e1f88257d9414b8fedc66b794817115f.scope. Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4073 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316463373762396464653564353333663632363137643134373135 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.920000 audit: BPF prog-id=173 op=LOAD Feb 9 18:35:20.920000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4073 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316463373762396464653564353333663632363137643134373135 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit: BPF prog-id=174 op=LOAD Feb 9 18:35:20.921000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4073 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316463373762396464653564353333663632363137643134373135 Feb 9 18:35:20.921000 audit: BPF prog-id=174 op=UNLOAD Feb 9 18:35:20.921000 audit: BPF prog-id=173 op=UNLOAD Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:20.921000 audit: BPF prog-id=175 op=LOAD Feb 9 18:35:20.921000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4073 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316463373762396464653564353333663632363137643134373135 Feb 9 18:35:20.941067 env[1353]: time="2024-02-09T18:35:20.941022267Z" level=info msg="StartContainer for \"3d1dc77b9dde5d533f62617d14715c83e1f88257d9414b8fedc66b794817115f\" returns successfully" Feb 9 18:35:21.481746 systemd[1]: run-containerd-runc-k8s.io-848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519-runc.Frkmxm.mount: Deactivated successfully. Feb 9 18:35:22.246756 systemd-networkd[1506]: cali67713a1ea04: Gained IPv6LL Feb 9 18:35:23.920015 env[1353]: time="2024-02-09T18:35:23.919961693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:23.928021 env[1353]: time="2024-02-09T18:35:23.927974556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:23.934706 env[1353]: time="2024-02-09T18:35:23.934654976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:23.945338 env[1353]: time="2024-02-09T18:35:23.945295287Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:23.945886 env[1353]: time="2024-02-09T18:35:23.945846888Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 18:35:23.955423 env[1353]: time="2024-02-09T18:35:23.955362916Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:35:23.962088 env[1353]: time="2024-02-09T18:35:23.962030615Z" level=info msg="CreateContainer within sandbox \"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 18:35:24.011939 env[1353]: time="2024-02-09T18:35:24.011890559Z" level=info msg="CreateContainer within sandbox \"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb\"" Feb 9 18:35:24.012787 env[1353]: time="2024-02-09T18:35:24.012755642Z" level=info msg="StartContainer for \"76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb\"" Feb 9 18:35:24.048100 systemd[1]: Started cri-containerd-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb.scope. Feb 9 18:35:24.067008 kernel: kauditd_printk_skb: 405 callbacks suppressed Feb 9 18:35:24.067130 kernel: audit: type=1400 audit(1707503724.061:1260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.114384 kernel: audit: type=1400 audit(1707503724.061:1261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.114549 kernel: audit: type=1400 audit(1707503724.061:1262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.149743 kernel: audit: type=1400 audit(1707503724.061:1263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.167829 kernel: audit: type=1400 audit(1707503724.061:1264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.189205 kernel: audit: type=1400 audit(1707503724.061:1265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.206986 kernel: audit: type=1400 audit(1707503724.061:1266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.228294 kernel: audit: type=1400 audit(1707503724.061:1267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.246306 kernel: audit: type=1400 audit(1707503724.061:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.267966 kernel: audit: type=1400 audit(1707503724.066:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.066000 audit: BPF prog-id=176 op=LOAD Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4202 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:24.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643138313164633462393237303235626438393230313165393764 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4202 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:24.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643138313164633462393237303235626438393230313165393764 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.092000 audit: BPF prog-id=177 op=LOAD Feb 9 18:35:24.092000 audit[4281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4202 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:24.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643138313164633462393237303235626438393230313165393764 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.111000 audit: BPF prog-id=178 op=LOAD Feb 9 18:35:24.111000 audit[4281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4202 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:24.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643138313164633462393237303235626438393230313165393764 Feb 9 18:35:24.137000 audit: BPF prog-id=178 op=UNLOAD Feb 9 18:35:24.137000 audit: BPF prog-id=177 op=UNLOAD Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { perfmon } for pid=4281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit[4281]: AVC avc: denied { bpf } for pid=4281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:24.137000 audit: BPF prog-id=179 op=LOAD Feb 9 18:35:24.137000 audit[4281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4202 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:24.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643138313164633462393237303235626438393230313165393764 Feb 9 18:35:24.280016 env[1353]: time="2024-02-09T18:35:24.279968248Z" level=info msg="StartContainer for \"76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb\" returns successfully" Feb 9 18:35:24.590791 kubelet[2484]: I0209 18:35:24.590669 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-c6cdf994c-czmgq" podStartSLOduration=29.509516212 podCreationTimestamp="2024-02-09 18:34:52 +0000 UTC" firstStartedPulling="2024-02-09 18:35:20.865146961 +0000 UTC m=+50.620095558" lastFinishedPulling="2024-02-09 18:35:23.946241129 +0000 UTC m=+53.701189806" observedRunningTime="2024-02-09 18:35:24.587679332 +0000 UTC m=+54.342627929" watchObservedRunningTime="2024-02-09 18:35:24.59061046 +0000 UTC m=+54.345559057" Feb 9 18:35:25.567169 env[1353]: time="2024-02-09T18:35:25.567126009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:25.578252 env[1353]: time="2024-02-09T18:35:25.578212681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:25.585106 env[1353]: time="2024-02-09T18:35:25.585042020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:25.591652 env[1353]: time="2024-02-09T18:35:25.591614959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:25.592368 env[1353]: time="2024-02-09T18:35:25.592340321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 18:35:25.596928 env[1353]: time="2024-02-09T18:35:25.596829573Z" level=info msg="CreateContainer within sandbox \"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:35:25.647062 env[1353]: time="2024-02-09T18:35:25.647013836Z" level=info msg="CreateContainer within sandbox \"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"17a4c514c1fdf7f7f512906fa970e0d429fd90c5269e40ec78539bd9934bad3d\"" Feb 9 18:35:25.648026 env[1353]: time="2024-02-09T18:35:25.647993079Z" level=info msg="StartContainer for \"17a4c514c1fdf7f7f512906fa970e0d429fd90c5269e40ec78539bd9934bad3d\"" Feb 9 18:35:25.670974 systemd[1]: Started cri-containerd-17a4c514c1fdf7f7f512906fa970e0d429fd90c5269e40ec78539bd9934bad3d.scope. Feb 9 18:35:25.699000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.699000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4073 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:25.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613463353134633166646637663766353132393036666139373065 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit: BPF prog-id=180 op=LOAD Feb 9 18:35:25.700000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4073 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:25.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613463353134633166646637663766353132393036666139373065 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.700000 audit: BPF prog-id=181 op=LOAD Feb 9 18:35:25.700000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4073 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:25.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613463353134633166646637663766353132393036666139373065 Feb 9 18:35:25.701000 audit: BPF prog-id=181 op=UNLOAD Feb 9 18:35:25.701000 audit: BPF prog-id=180 op=UNLOAD Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:25.701000 audit: BPF prog-id=182 op=LOAD Feb 9 18:35:25.701000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4073 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:25.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613463353134633166646637663766353132393036666139373065 Feb 9 18:35:25.736792 env[1353]: time="2024-02-09T18:35:25.736751012Z" level=info msg="StartContainer for \"17a4c514c1fdf7f7f512906fa970e0d429fd90c5269e40ec78539bd9934bad3d\" returns successfully" Feb 9 18:35:26.475000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.475000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4010045020 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.475000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.475000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4010a7ad20 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4010a7ad50 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.487000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.487000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40108102d0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.487000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.498000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.498000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40111a63f0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.498000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:26.498000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40100458e0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:35:26.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:35:26.505284 kubelet[2484]: I0209 18:35:26.505264 2484 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:35:26.505618 kubelet[2484]: I0209 18:35:26.505605 2484 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:35:27.875000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:27.875000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001bc9f80 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:27.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:27.876000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:27.876000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010f9c80 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:27.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:30.375594 env[1353]: time="2024-02-09T18:35:30.375544466Z" level=info msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.413 [WARNING][4390] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0", GenerateName:"calico-kube-controllers-c6cdf994c-", Namespace:"calico-system", SelfLink:"", UID:"29b137ea-760c-47b3-b7bf-0d9a2d4bf827", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c6cdf994c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519", Pod:"calico-kube-controllers-c6cdf994c-czmgq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali67713a1ea04", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.413 [INFO][4390] k8s.go 578: Cleaning up netns ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.413 [INFO][4390] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" iface="eth0" netns="" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.413 [INFO][4390] k8s.go 585: Releasing IP address(es) ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.413 [INFO][4390] utils.go 188: Calico CNI releasing IP address ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.429 [INFO][4396] ipam_plugin.go 415: Releasing address using handleID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.429 [INFO][4396] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.430 [INFO][4396] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.438 [WARNING][4396] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.438 [INFO][4396] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.440 [INFO][4396] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.442009 env[1353]: 2024-02-09 18:35:30.441 [INFO][4390] k8s.go 591: Teardown processing complete. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.442556 env[1353]: time="2024-02-09T18:35:30.442519649Z" level=info msg="TearDown network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" successfully" Feb 9 18:35:30.442629 env[1353]: time="2024-02-09T18:35:30.442614089Z" level=info msg="StopPodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" returns successfully" Feb 9 18:35:30.446218 env[1353]: time="2024-02-09T18:35:30.446187299Z" level=info msg="RemovePodSandbox for \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" Feb 9 18:35:30.446309 env[1353]: time="2024-02-09T18:35:30.446227179Z" level=info msg="Forcibly stopping sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\"" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.486 [WARNING][4414] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0", GenerateName:"calico-kube-controllers-c6cdf994c-", Namespace:"calico-system", SelfLink:"", UID:"29b137ea-760c-47b3-b7bf-0d9a2d4bf827", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c6cdf994c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"848244a281d3cac1eba0ce104aca6fd25b6ff3ac2967b30628ee5e305a897519", Pod:"calico-kube-controllers-c6cdf994c-czmgq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali67713a1ea04", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.486 [INFO][4414] k8s.go 578: Cleaning up netns ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.487 [INFO][4414] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" iface="eth0" netns="" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.487 [INFO][4414] k8s.go 585: Releasing IP address(es) ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.487 [INFO][4414] utils.go 188: Calico CNI releasing IP address ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.504 [INFO][4421] ipam_plugin.go 415: Releasing address using handleID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.504 [INFO][4421] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.504 [INFO][4421] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.516 [WARNING][4421] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.516 [INFO][4421] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" HandleID="k8s-pod-network.52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--kube--controllers--c6cdf994c--czmgq-eth0" Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.518 [INFO][4421] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.520989 env[1353]: 2024-02-09 18:35:30.519 [INFO][4414] k8s.go 591: Teardown processing complete. ContainerID="52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538" Feb 9 18:35:30.521529 env[1353]: time="2024-02-09T18:35:30.521474945Z" level=info msg="TearDown network for sandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" successfully" Feb 9 18:35:30.532329 env[1353]: time="2024-02-09T18:35:30.532289975Z" level=info msg="RemovePodSandbox \"52a7831ab9c8343714ccc9e2f12902713ca3a868fc5a462f60954cce60700538\" returns successfully" Feb 9 18:35:30.533089 env[1353]: time="2024-02-09T18:35:30.533048817Z" level=info msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.564 [WARNING][4440] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e", Pod:"csi-node-driver-6hpwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali719da6aedf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.565 [INFO][4440] k8s.go 578: Cleaning up netns ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.565 [INFO][4440] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" iface="eth0" netns="" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.565 [INFO][4440] k8s.go 585: Releasing IP address(es) ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.565 [INFO][4440] utils.go 188: Calico CNI releasing IP address ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.583 [INFO][4446] ipam_plugin.go 415: Releasing address using handleID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.583 [INFO][4446] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.584 [INFO][4446] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.592 [WARNING][4446] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.592 [INFO][4446] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.593 [INFO][4446] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.595874 env[1353]: 2024-02-09 18:35:30.594 [INFO][4440] k8s.go 591: Teardown processing complete. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.596393 env[1353]: time="2024-02-09T18:35:30.596350870Z" level=info msg="TearDown network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" successfully" Feb 9 18:35:30.596463 env[1353]: time="2024-02-09T18:35:30.596448070Z" level=info msg="StopPodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" returns successfully" Feb 9 18:35:30.596954 env[1353]: time="2024-02-09T18:35:30.596934551Z" level=info msg="RemovePodSandbox for \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" Feb 9 18:35:30.597108 env[1353]: time="2024-02-09T18:35:30.597067672Z" level=info msg="Forcibly stopping sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\"" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.636 [WARNING][4464] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e8ce9d0-c905-4d9e-a117-75d893b9fe9f", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"5446698c023f26c5b083272f69c16036336874fef30d3eb2d36a549d7bdf2d4e", Pod:"csi-node-driver-6hpwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.5.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali719da6aedf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.636 [INFO][4464] k8s.go 578: Cleaning up netns ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.636 [INFO][4464] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" iface="eth0" netns="" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.636 [INFO][4464] k8s.go 585: Releasing IP address(es) ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.636 [INFO][4464] utils.go 188: Calico CNI releasing IP address ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.659 [INFO][4471] ipam_plugin.go 415: Releasing address using handleID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.660 [INFO][4471] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.660 [INFO][4471] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.670 [WARNING][4471] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.670 [INFO][4471] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" HandleID="k8s-pod-network.bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Workload="ci--3510.3.2--a--9ade464be9-k8s-csi--node--driver--6hpwv-eth0" Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.671 [INFO][4471] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.673979 env[1353]: 2024-02-09 18:35:30.672 [INFO][4464] k8s.go 591: Teardown processing complete. ContainerID="bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e" Feb 9 18:35:30.674490 env[1353]: time="2024-02-09T18:35:30.674435284Z" level=info msg="TearDown network for sandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" successfully" Feb 9 18:35:30.687643 env[1353]: time="2024-02-09T18:35:30.687603320Z" level=info msg="RemovePodSandbox \"bb8a0bff0e2c212c61ebc68dd7e9c3fe555aafd49ea8ecfd937d3a072ecd0d3e\" returns successfully" Feb 9 18:35:30.688235 env[1353]: time="2024-02-09T18:35:30.688198481Z" level=info msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.740 [WARNING][4489] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"890357e6-1ea3-4f53-8cd3-ec94904a465c", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58", Pod:"coredns-5d78c9869d-5jll2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b8beb9e953", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.743 [INFO][4489] k8s.go 578: Cleaning up netns ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.743 [INFO][4489] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" iface="eth0" netns="" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.743 [INFO][4489] k8s.go 585: Releasing IP address(es) ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.743 [INFO][4489] utils.go 188: Calico CNI releasing IP address ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.760 [INFO][4495] ipam_plugin.go 415: Releasing address using handleID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.760 [INFO][4495] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.760 [INFO][4495] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.768 [WARNING][4495] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.769 [INFO][4495] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.770 [INFO][4495] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.772424 env[1353]: 2024-02-09 18:35:30.771 [INFO][4489] k8s.go 591: Teardown processing complete. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.772982 env[1353]: time="2024-02-09T18:35:30.772453592Z" level=info msg="TearDown network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" successfully" Feb 9 18:35:30.772982 env[1353]: time="2024-02-09T18:35:30.772536032Z" level=info msg="StopPodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" returns successfully" Feb 9 18:35:30.772982 env[1353]: time="2024-02-09T18:35:30.772969513Z" level=info msg="RemovePodSandbox for \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" Feb 9 18:35:30.773049 env[1353]: time="2024-02-09T18:35:30.772999473Z" level=info msg="Forcibly stopping sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\"" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.807 [WARNING][4514] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"890357e6-1ea3-4f53-8cd3-ec94904a465c", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"d5cef350407562337dd45e1ca482d436e74b22d0e61685653ae2349333fb0d58", Pod:"coredns-5d78c9869d-5jll2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b8beb9e953", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.807 [INFO][4514] k8s.go 578: Cleaning up netns ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.807 [INFO][4514] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" iface="eth0" netns="" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.807 [INFO][4514] k8s.go 585: Releasing IP address(es) ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.807 [INFO][4514] utils.go 188: Calico CNI releasing IP address ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.829 [INFO][4522] ipam_plugin.go 415: Releasing address using handleID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.829 [INFO][4522] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.829 [INFO][4522] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.839 [WARNING][4522] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.839 [INFO][4522] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" HandleID="k8s-pod-network.b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--5jll2-eth0" Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.840 [INFO][4522] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.842776 env[1353]: 2024-02-09 18:35:30.841 [INFO][4514] k8s.go 591: Teardown processing complete. ContainerID="b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb" Feb 9 18:35:30.843289 env[1353]: time="2024-02-09T18:35:30.843257785Z" level=info msg="TearDown network for sandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" successfully" Feb 9 18:35:30.850618 env[1353]: time="2024-02-09T18:35:30.850576325Z" level=info msg="RemovePodSandbox \"b91a4e384b4a8d30e1287207b6cbb853ba1ce08aded9b4f715abca1a19e304cb\" returns successfully" Feb 9 18:35:30.851215 env[1353]: time="2024-02-09T18:35:30.851187567Z" level=info msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.885 [WARNING][4540] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8db6dccf-6f52-4813-9071-d41ebb177d4f", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba", Pod:"coredns-5d78c9869d-bjk2r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e70c18984c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.885 [INFO][4540] k8s.go 578: Cleaning up netns ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.885 [INFO][4540] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" iface="eth0" netns="" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.885 [INFO][4540] k8s.go 585: Releasing IP address(es) ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.885 [INFO][4540] utils.go 188: Calico CNI releasing IP address ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.902 [INFO][4548] ipam_plugin.go 415: Releasing address using handleID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.903 [INFO][4548] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.903 [INFO][4548] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.912 [WARNING][4548] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.912 [INFO][4548] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.913 [INFO][4548] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.915457 env[1353]: 2024-02-09 18:35:30.914 [INFO][4540] k8s.go 591: Teardown processing complete. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.915932 env[1353]: time="2024-02-09T18:35:30.915505023Z" level=info msg="TearDown network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" successfully" Feb 9 18:35:30.915932 env[1353]: time="2024-02-09T18:35:30.915536063Z" level=info msg="StopPodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" returns successfully" Feb 9 18:35:30.916423 env[1353]: time="2024-02-09T18:35:30.916393906Z" level=info msg="RemovePodSandbox for \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" Feb 9 18:35:30.916524 env[1353]: time="2024-02-09T18:35:30.916437186Z" level=info msg="Forcibly stopping sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\"" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.947 [WARNING][4566] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8db6dccf-6f52-4813-9071-d41ebb177d4f", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"3c885b2861058147f332022b6e1a508c4cf06e0daf0c3f51cfb4f9b9ed34dbba", Pod:"coredns-5d78c9869d-bjk2r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e70c18984c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.947 [INFO][4566] k8s.go 578: Cleaning up netns ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.947 [INFO][4566] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" iface="eth0" netns="" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.947 [INFO][4566] k8s.go 585: Releasing IP address(es) ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.947 [INFO][4566] utils.go 188: Calico CNI releasing IP address ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.963 [INFO][4572] ipam_plugin.go 415: Releasing address using handleID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.963 [INFO][4572] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.963 [INFO][4572] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.972 [WARNING][4572] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.972 [INFO][4572] ipam_plugin.go 443: Releasing address using workloadID ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" HandleID="k8s-pod-network.68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Workload="ci--3510.3.2--a--9ade464be9-k8s-coredns--5d78c9869d--bjk2r-eth0" Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.973 [INFO][4572] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:30.977028 env[1353]: 2024-02-09 18:35:30.974 [INFO][4566] k8s.go 591: Teardown processing complete. ContainerID="68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76" Feb 9 18:35:30.977028 env[1353]: time="2024-02-09T18:35:30.975664748Z" level=info msg="TearDown network for sandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" successfully" Feb 9 18:35:30.984172 env[1353]: time="2024-02-09T18:35:30.984088691Z" level=info msg="RemovePodSandbox \"68258ea47a348bbd1dccc887414806b341a38ce4f3fdd32da9cfba152683bc76\" returns successfully" Feb 9 18:35:34.093957 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.lp8Czi.mount: Deactivated successfully. Feb 9 18:35:35.168651 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.Ar5UOw.mount: Deactivated successfully. Feb 9 18:35:35.221647 kubelet[2484]: I0209 18:35:35.221353 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-6hpwv" podStartSLOduration=36.698043422 podCreationTimestamp="2024-02-09 18:34:52 +0000 UTC" firstStartedPulling="2024-02-09 18:35:19.069814594 +0000 UTC m=+48.824763151" lastFinishedPulling="2024-02-09 18:35:25.593087883 +0000 UTC m=+55.348036440" observedRunningTime="2024-02-09 18:35:26.589880146 +0000 UTC m=+56.344828743" watchObservedRunningTime="2024-02-09 18:35:35.221316711 +0000 UTC m=+64.976265308" Feb 9 18:35:37.337994 kubelet[2484]: I0209 18:35:37.337902 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:35:37.342913 systemd[1]: Created slice kubepods-besteffort-podc4b1bc7b_a9d4_4956_b275_aa1a66a2b4ba.slice. Feb 9 18:35:37.358172 kubelet[2484]: I0209 18:35:37.358130 2484 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:35:37.362634 systemd[1]: Created slice kubepods-besteffort-pod80e48b71_bc04_43ff_9940_343f66456a46.slice. Feb 9 18:35:37.388000 audit[4628]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.394735 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 9 18:35:37.394823 kernel: audit: type=1325 audit(1707503737.388:1292): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.388000 audit[4628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd0639d0 a2=0 a3=ffffb6e516c0 items=0 ppid=2664 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.427914 kubelet[2484]: I0209 18:35:37.427883 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba-calico-apiserver-certs\") pod \"calico-apiserver-68cf786685-2wxx4\" (UID: \"c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba\") " pod="calico-apiserver/calico-apiserver-68cf786685-2wxx4" Feb 9 18:35:37.428102 kubelet[2484]: I0209 18:35:37.428091 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6sm24\" (UniqueName: \"kubernetes.io/projected/c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba-kube-api-access-6sm24\") pod \"calico-apiserver-68cf786685-2wxx4\" (UID: \"c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba\") " pod="calico-apiserver/calico-apiserver-68cf786685-2wxx4" Feb 9 18:35:37.437424 kernel: audit: type=1300 audit(1707503737.388:1292): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd0639d0 a2=0 a3=ffffb6e516c0 items=0 ppid=2664 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.451514 kernel: audit: type=1327 audit(1707503737.388:1292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.407000 audit[4628]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.407000 audit[4628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcd0639d0 a2=0 a3=ffffb6e516c0 items=0 ppid=2664 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.513368 kernel: audit: type=1325 audit(1707503737.407:1293): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.513562 kernel: audit: type=1300 audit(1707503737.407:1293): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcd0639d0 a2=0 a3=ffffb6e516c0 items=0 ppid=2664 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.528726 kernel: audit: type=1327 audit(1707503737.407:1293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.529095 kubelet[2484]: I0209 18:35:37.529059 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/80e48b71-bc04-43ff-9940-343f66456a46-calico-apiserver-certs\") pod \"calico-apiserver-68cf786685-4r9p7\" (UID: \"80e48b71-bc04-43ff-9940-343f66456a46\") " pod="calico-apiserver/calico-apiserver-68cf786685-4r9p7" Feb 9 18:35:37.529272 kubelet[2484]: E0209 18:35:37.529246 2484 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 18:35:37.529328 kubelet[2484]: E0209 18:35:37.529316 2484 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba-calico-apiserver-certs podName:c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba nodeName:}" failed. No retries permitted until 2024-02-09 18:35:38.029295815 +0000 UTC m=+67.784244412 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba-calico-apiserver-certs") pod "calico-apiserver-68cf786685-2wxx4" (UID: "c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba") : secret "calico-apiserver-certs" not found Feb 9 18:35:37.529624 kubelet[2484]: I0209 18:35:37.529601 2484 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v5lkx\" (UniqueName: \"kubernetes.io/projected/80e48b71-bc04-43ff-9940-343f66456a46-kube-api-access-v5lkx\") pod \"calico-apiserver-68cf786685-4r9p7\" (UID: \"80e48b71-bc04-43ff-9940-343f66456a46\") " pod="calico-apiserver/calico-apiserver-68cf786685-4r9p7" Feb 9 18:35:37.488000 audit[4630]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.488000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd2cf6dd0 a2=0 a3=ffff8bc7b6c0 items=0 ppid=2664 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.575711 kernel: audit: type=1325 audit(1707503737.488:1294): table=filter:119 family=2 entries=10 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.575842 kernel: audit: type=1300 audit(1707503737.488:1294): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd2cf6dd0 a2=0 a3=ffff8bc7b6c0 items=0 ppid=2664 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.594946 kernel: audit: type=1327 audit(1707503737.488:1294): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.530000 audit[4630]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.608848 kernel: audit: type=1325 audit(1707503737.530:1295): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:37.530000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd2cf6dd0 a2=0 a3=ffff8bc7b6c0 items=0 ppid=2664 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:37.665953 env[1353]: time="2024-02-09T18:35:37.665894811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68cf786685-4r9p7,Uid:80e48b71-bc04-43ff-9940-343f66456a46,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:35:37.824808 systemd-networkd[1506]: calidbb507b8d83: Link UP Feb 9 18:35:37.838931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:35:37.839030 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidbb507b8d83: link becomes ready Feb 9 18:35:37.840022 systemd-networkd[1506]: calidbb507b8d83: Gained carrier Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.742 [INFO][4634] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0 calico-apiserver-68cf786685- calico-apiserver 80e48b71-bc04-43ff-9940-343f66456a46 862 0 2024-02-09 18:35:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68cf786685 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 calico-apiserver-68cf786685-4r9p7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidbb507b8d83 [] []}} ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.743 [INFO][4634] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.774 [INFO][4645] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" HandleID="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.790 [INFO][4645] ipam_plugin.go 268: Auto assigning IP ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" HandleID="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011a400), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-9ade464be9", "pod":"calico-apiserver-68cf786685-4r9p7", "timestamp":"2024-02-09 18:35:37.774173494 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.790 [INFO][4645] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.790 [INFO][4645] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.790 [INFO][4645] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.792 [INFO][4645] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.798 [INFO][4645] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.801 [INFO][4645] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.803 [INFO][4645] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.805 [INFO][4645] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.805 [INFO][4645] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.807 [INFO][4645] ipam.go 1682: Creating new handle: k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.810 [INFO][4645] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.819 [INFO][4645] ipam.go 1216: Successfully claimed IPs: [192.168.5.5/26] block=192.168.5.0/26 handle="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.819 [INFO][4645] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.5/26] handle="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.819 [INFO][4645] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:37.847835 env[1353]: 2024-02-09 18:35:37.819 [INFO][4645] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.5/26] IPv6=[] ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" HandleID="k8s-pod-network.2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.820 [INFO][4634] k8s.go 385: Populated endpoint ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0", GenerateName:"calico-apiserver-68cf786685-", Namespace:"calico-apiserver", SelfLink:"", UID:"80e48b71-bc04-43ff-9940-343f66456a46", ResourceVersion:"862", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68cf786685", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"calico-apiserver-68cf786685-4r9p7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidbb507b8d83", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.821 [INFO][4634] k8s.go 386: Calico CNI using IPs: [192.168.5.5/32] ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.821 [INFO][4634] dataplane_linux.go 68: Setting the host side veth name to calidbb507b8d83 ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.840 [INFO][4634] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.840 [INFO][4634] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0", GenerateName:"calico-apiserver-68cf786685-", Namespace:"calico-apiserver", SelfLink:"", UID:"80e48b71-bc04-43ff-9940-343f66456a46", ResourceVersion:"862", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68cf786685", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f", Pod:"calico-apiserver-68cf786685-4r9p7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidbb507b8d83", MAC:"ba:c5:ab:5f:7b:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:37.848377 env[1353]: 2024-02-09 18:35:37.846 [INFO][4634] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-4r9p7" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--4r9p7-eth0" Feb 9 18:35:37.869585 env[1353]: time="2024-02-09T18:35:37.869519783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:37.869757 env[1353]: time="2024-02-09T18:35:37.869734023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:37.869852 env[1353]: time="2024-02-09T18:35:37.869831783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:37.870110 env[1353]: time="2024-02-09T18:35:37.870081504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f pid=4673 runtime=io.containerd.runc.v2 Feb 9 18:35:37.883028 systemd[1]: Started cri-containerd-2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f.scope. Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.903000 audit: BPF prog-id=183 op=LOAD Feb 9 18:35:37.903000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.903000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4673 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356631643238373935613737323136373430353864363262356331 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4673 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356631643238373935613737323136373430353864363262356331 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.904000 audit: BPF prog-id=184 op=LOAD Feb 9 18:35:37.904000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4673 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356631643238373935613737323136373430353864363262356331 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit: BPF prog-id=185 op=LOAD Feb 9 18:35:37.905000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4673 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356631643238373935613737323136373430353864363262356331 Feb 9 18:35:37.905000 audit: BPF prog-id=185 op=UNLOAD Feb 9 18:35:37.905000 audit: BPF prog-id=184 op=UNLOAD Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:37.905000 audit: BPF prog-id=186 op=LOAD Feb 9 18:35:37.905000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4673 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356631643238373935613737323136373430353864363262356331 Feb 9 18:35:37.913000 audit[4705]: NETFILTER_CFG table=filter:121 family=2 entries=55 op=nft_register_chain pid=4705 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:37.913000 audit[4705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffe0d7ddc0 a2=0 a3=ffff93a19fa8 items=0 ppid=3574 pid=4705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:37.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:37.927541 env[1353]: time="2024-02-09T18:35:37.927303333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68cf786685-4r9p7,Uid:80e48b71-bc04-43ff-9940-343f66456a46,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f\"" Feb 9 18:35:37.929159 env[1353]: time="2024-02-09T18:35:37.929050418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:35:38.246063 env[1353]: time="2024-02-09T18:35:38.246005601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68cf786685-2wxx4,Uid:c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:35:38.399549 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7d369251bc: link becomes ready Feb 9 18:35:38.400052 systemd-networkd[1506]: calie7d369251bc: Link UP Feb 9 18:35:38.400186 systemd-networkd[1506]: calie7d369251bc: Gained carrier Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.314 [INFO][4713] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0 calico-apiserver-68cf786685- calico-apiserver c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba 857 0 2024-02-09 18:35:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68cf786685 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-9ade464be9 calico-apiserver-68cf786685-2wxx4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie7d369251bc [] []}} ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.314 [INFO][4713] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.338 [INFO][4725] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" HandleID="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.353 [INFO][4725] ipam_plugin.go 268: Auto assigning IP ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" HandleID="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-9ade464be9", "pod":"calico-apiserver-68cf786685-2wxx4", "timestamp":"2024-02-09 18:35:38.338753081 +0000 UTC"}, Hostname:"ci-3510.3.2-a-9ade464be9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.354 [INFO][4725] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.354 [INFO][4725] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.354 [INFO][4725] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-9ade464be9' Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.355 [INFO][4725] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.361 [INFO][4725] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.368 [INFO][4725] ipam.go 489: Trying affinity for 192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.370 [INFO][4725] ipam.go 155: Attempting to load block cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.372 [INFO][4725] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.0/26 host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.372 [INFO][4725] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.0/26 handle="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.373 [INFO][4725] ipam.go 1682: Creating new handle: k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713 Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.376 [INFO][4725] ipam.go 1203: Writing block in order to claim IPs block=192.168.5.0/26 handle="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.383 [INFO][4725] ipam.go 1216: Successfully claimed IPs: [192.168.5.6/26] block=192.168.5.0/26 handle="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.383 [INFO][4725] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.6/26] handle="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" host="ci-3510.3.2-a-9ade464be9" Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.384 [INFO][4725] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:38.410397 env[1353]: 2024-02-09 18:35:38.384 [INFO][4725] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.5.6/26] IPv6=[] ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" HandleID="k8s-pod-network.78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Workload="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.388 [INFO][4713] k8s.go 385: Populated endpoint ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0", GenerateName:"calico-apiserver-68cf786685-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68cf786685", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"", Pod:"calico-apiserver-68cf786685-2wxx4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie7d369251bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.388 [INFO][4713] k8s.go 386: Calico CNI using IPs: [192.168.5.6/32] ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.388 [INFO][4713] dataplane_linux.go 68: Setting the host side veth name to calie7d369251bc ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.399 [INFO][4713] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.401 [INFO][4713] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0", GenerateName:"calico-apiserver-68cf786685-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68cf786685", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-9ade464be9", ContainerID:"78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713", Pod:"calico-apiserver-68cf786685-2wxx4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie7d369251bc", MAC:"c2:7c:7b:8c:2d:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:38.410961 env[1353]: 2024-02-09 18:35:38.409 [INFO][4713] k8s.go 491: Wrote updated endpoint to datastore ContainerID="78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713" Namespace="calico-apiserver" Pod="calico-apiserver-68cf786685-2wxx4" WorkloadEndpoint="ci--3510.3.2--a--9ade464be9-k8s-calico--apiserver--68cf786685--2wxx4-eth0" Feb 9 18:35:38.428306 env[1353]: time="2024-02-09T18:35:38.428221473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:38.428444 env[1353]: time="2024-02-09T18:35:38.428316474Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:38.428444 env[1353]: time="2024-02-09T18:35:38.428357594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:38.428663 env[1353]: time="2024-02-09T18:35:38.428619355Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713 pid=4753 runtime=io.containerd.runc.v2 Feb 9 18:35:38.434000 audit[4769]: NETFILTER_CFG table=filter:122 family=2 entries=46 op=nft_register_chain pid=4769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:38.434000 audit[4769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23292 a0=3 a1=ffffcf71d5e0 a2=0 a3=ffffaec8cfa8 items=0 ppid=3574 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.434000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:38.442315 systemd[1]: Started cri-containerd-78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713.scope. Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.456000 audit: BPF prog-id=187 op=LOAD Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=4753 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636134373333616361343034343737383935386564653835646466 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=4753 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636134373333616361343034343737383935386564653835646466 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit: BPF prog-id=188 op=LOAD Feb 9 18:35:38.457000 audit[4762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=4753 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636134373333616361343034343737383935386564653835646466 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit: BPF prog-id=189 op=LOAD Feb 9 18:35:38.457000 audit[4762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=4753 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636134373333616361343034343737383935386564653835646466 Feb 9 18:35:38.457000 audit: BPF prog-id=189 op=UNLOAD Feb 9 18:35:38.457000 audit: BPF prog-id=188 op=UNLOAD Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { perfmon } for pid=4762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit[4762]: AVC avc: denied { bpf } for pid=4762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:38.457000 audit: BPF prog-id=190 op=LOAD Feb 9 18:35:38.457000 audit[4762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=4753 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636134373333616361343034343737383935386564653835646466 Feb 9 18:35:38.478555 env[1353]: time="2024-02-09T18:35:38.478506404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68cf786685-2wxx4,Uid:c4b1bc7b-a9d4-4956-b275-aa1a66a2b4ba,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713\"" Feb 9 18:35:39.154350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4005599790.mount: Deactivated successfully. Feb 9 18:35:39.723528 systemd-networkd[1506]: calidbb507b8d83: Gained IPv6LL Feb 9 18:35:40.102667 systemd-networkd[1506]: calie7d369251bc: Gained IPv6LL Feb 9 18:35:40.408011 env[1353]: time="2024-02-09T18:35:40.407900739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.414100 env[1353]: time="2024-02-09T18:35:40.414051875Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.418684 env[1353]: time="2024-02-09T18:35:40.418653727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.427827 env[1353]: time="2024-02-09T18:35:40.427790190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.428539 env[1353]: time="2024-02-09T18:35:40.428508472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:35:40.431472 env[1353]: time="2024-02-09T18:35:40.430887078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:35:40.432506 env[1353]: time="2024-02-09T18:35:40.432014921Z" level=info msg="CreateContainer within sandbox \"2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:35:40.479297 env[1353]: time="2024-02-09T18:35:40.479240162Z" level=info msg="CreateContainer within sandbox \"2c5f1d28795a7721674058d62b5c136dc8ff36c837d2933ad94d071b92552c8f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d\"" Feb 9 18:35:40.480066 env[1353]: time="2024-02-09T18:35:40.480041204Z" level=info msg="StartContainer for \"0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d\"" Feb 9 18:35:40.504360 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.W9I2oa.mount: Deactivated successfully. Feb 9 18:35:40.508380 systemd[1]: Started cri-containerd-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d.scope. Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.524000 audit: BPF prog-id=191 op=LOAD Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4673 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323963393536323338346534643730313033663538333466336230 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4673 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323963393536323338346534643730313033663538333466336230 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.526000 audit: BPF prog-id=192 op=LOAD Feb 9 18:35:40.526000 audit[4795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4673 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323963393536323338346534643730313033663538333466336230 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.527000 audit: BPF prog-id=193 op=LOAD Feb 9 18:35:40.527000 audit[4795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4673 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323963393536323338346534643730313033663538333466336230 Feb 9 18:35:40.528000 audit: BPF prog-id=193 op=UNLOAD Feb 9 18:35:40.528000 audit: BPF prog-id=192 op=UNLOAD Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { perfmon } for pid=4795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit[4795]: AVC avc: denied { bpf } for pid=4795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.528000 audit: BPF prog-id=194 op=LOAD Feb 9 18:35:40.528000 audit[4795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4673 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323963393536323338346534643730313033663538333466336230 Feb 9 18:35:40.555659 env[1353]: time="2024-02-09T18:35:40.555618598Z" level=info msg="StartContainer for \"0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d\" returns successfully" Feb 9 18:35:40.633003 kubelet[2484]: I0209 18:35:40.632721 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68cf786685-4r9p7" podStartSLOduration=1.132143778 podCreationTimestamp="2024-02-09 18:35:37 +0000 UTC" firstStartedPulling="2024-02-09 18:35:37.928841057 +0000 UTC m=+67.683789654" lastFinishedPulling="2024-02-09 18:35:40.429378474 +0000 UTC m=+70.184327071" observedRunningTime="2024-02-09 18:35:40.632102234 +0000 UTC m=+70.387050831" watchObservedRunningTime="2024-02-09 18:35:40.632681195 +0000 UTC m=+70.387629792" Feb 9 18:35:40.645000 audit[4826]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:40.645000 audit[4826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffccab26e0 a2=0 a3=ffffabb606c0 items=0 ppid=2664 pid=4826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:40.646000 audit[4826]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:40.646000 audit[4826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffccab26e0 a2=0 a3=ffffabb606c0 items=0 ppid=2664 pid=4826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:40.779553 env[1353]: time="2024-02-09T18:35:40.776973245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.784001 env[1353]: time="2024-02-09T18:35:40.783969743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.786792 env[1353]: time="2024-02-09T18:35:40.786766070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.791766 env[1353]: time="2024-02-09T18:35:40.791727843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:40.792406 env[1353]: time="2024-02-09T18:35:40.792363284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:35:40.794503 env[1353]: time="2024-02-09T18:35:40.794456130Z" level=info msg="CreateContainer within sandbox \"78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:35:40.829514 env[1353]: time="2024-02-09T18:35:40.829454859Z" level=info msg="CreateContainer within sandbox \"78ca4733aca4044778958ede85ddffc3cc35baf5145a5bda7a33a7ca54b49713\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a\"" Feb 9 18:35:40.830379 env[1353]: time="2024-02-09T18:35:40.830345502Z" level=info msg="StartContainer for \"7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a\"" Feb 9 18:35:40.848954 systemd[1]: Started cri-containerd-7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a.scope. Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.873000 audit: BPF prog-id=195 op=LOAD Feb 9 18:35:40.874000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.874000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4753 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763363730336432636239363131643037363338393132643534313032 Feb 9 18:35:40.874000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.874000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4753 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763363730336432636239363131643037363338393132643534313032 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit: BPF prog-id=196 op=LOAD Feb 9 18:35:40.875000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4753 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763363730336432636239363131643037363338393132643534313032 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.875000 audit: BPF prog-id=197 op=LOAD Feb 9 18:35:40.875000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4753 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763363730336432636239363131643037363338393132643534313032 Feb 9 18:35:40.876000 audit: BPF prog-id=197 op=UNLOAD Feb 9 18:35:40.876000 audit: BPF prog-id=196 op=UNLOAD Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:40.876000 audit: BPF prog-id=198 op=LOAD Feb 9 18:35:40.876000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4753 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:40.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763363730336432636239363131643037363338393132643534313032 Feb 9 18:35:40.922858 env[1353]: time="2024-02-09T18:35:40.922805459Z" level=info msg="StartContainer for \"7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a\" returns successfully" Feb 9 18:35:41.380000 audit[4806]: AVC avc: denied { watch } for pid=4806 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_37.3049246729/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c420 tclass=file permissive=0 Feb 9 18:35:41.380000 audit[4806]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e22160 a2=fc6 a3=0 items=0 ppid=4673 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 key=(null) Feb 9 18:35:41.380000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:35:41.634253 kubelet[2484]: I0209 18:35:41.634155 2484 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68cf786685-2wxx4" podStartSLOduration=2.321227154 podCreationTimestamp="2024-02-09 18:35:37 +0000 UTC" firstStartedPulling="2024-02-09 18:35:38.479798127 +0000 UTC m=+68.234746724" lastFinishedPulling="2024-02-09 18:35:40.792677205 +0000 UTC m=+70.547625802" observedRunningTime="2024-02-09 18:35:41.633013909 +0000 UTC m=+71.387962506" watchObservedRunningTime="2024-02-09 18:35:41.634106232 +0000 UTC m=+71.389054829" Feb 9 18:35:41.655000 audit[4868]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:41.655000 audit[4868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcdc5b990 a2=0 a3=ffffa02316c0 items=0 ppid=2664 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:41.655000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:41.666000 audit[4868]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:41.666000 audit[4868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcdc5b990 a2=0 a3=ffffa02316c0 items=0 ppid=2664 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:41.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:41.765000 audit[4847]: AVC avc: denied { watch } for pid=4847 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_38.3790498404/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c697 tclass=file permissive=0 Feb 9 18:35:41.765000 audit[4847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f4e900 a2=fc6 a3=0 items=0 ppid=4753 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 key=(null) Feb 9 18:35:41.765000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:35:44.900000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:44.907569 kernel: kauditd_printk_skb: 254 callbacks suppressed Feb 9 18:35:44.907765 kernel: audit: type=1400 audit(1707503744.900:1376): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:44.900000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400289cee0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.960906 kernel: audit: type=1300 audit(1707503744.900:1376): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400289cee0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.961044 kernel: audit: type=1327 audit(1707503744.900:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:44.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:44.902000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:45.009485 kernel: audit: type=1400 audit(1707503744.902:1377): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:45.009620 kernel: audit: type=1300 audit(1707503744.902:1377): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400289cf00 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.902000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400289cf00 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:45.068147 kernel: audit: type=1327 audit(1707503744.902:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:44.913000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:45.091553 kernel: audit: type=1400 audit(1707503744.913:1378): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:45.091738 kernel: audit: type=1400 audit(1707503744.913:1379): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:44.913000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:44.913000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002565f20 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:45.144696 kernel: audit: type=1300 audit(1707503744.913:1379): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002565f20 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:45.169803 kernel: audit: type=1327 audit(1707503744.913:1379): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:44.913000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002565f00 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:35:44.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:04.095343 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.kLvvQN.mount: Deactivated successfully. Feb 9 18:36:05.166709 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.ARCq7v.mount: Deactivated successfully. Feb 9 18:36:06.349358 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.FanPAY.mount: Deactivated successfully. Feb 9 18:36:07.692946 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.jXyV5d.mount: Deactivated successfully. Feb 9 18:36:07.765000 audit[4966]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:07.772335 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 18:36:07.772469 kernel: audit: type=1325 audit(1707503767.765:1380): table=filter:127 family=2 entries=9 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:07.765000 audit[4966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffedadb1d0 a2=0 a3=ffffbed9a6c0 items=0 ppid=2664 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:07.820524 kernel: audit: type=1300 audit(1707503767.765:1380): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffedadb1d0 a2=0 a3=ffffbed9a6c0 items=0 ppid=2664 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:07.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:07.835187 kernel: audit: type=1327 audit(1707503767.765:1380): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:07.789000 audit[4966]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_register_chain pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:07.852735 kernel: audit: type=1325 audit(1707503767.789:1381): table=nat:128 family=2 entries=27 op=nft_register_chain pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:07.789000 audit[4966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffedadb1d0 a2=0 a3=ffffbed9a6c0 items=0 ppid=2664 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:07.884810 kernel: audit: type=1300 audit(1707503767.789:1381): arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffedadb1d0 a2=0 a3=ffffbed9a6c0 items=0 ppid=2664 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:07.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:07.903790 kernel: audit: type=1327 audit(1707503767.789:1381): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:08.311000 audit[4988]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:08.311000 audit[4988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff827c430 a2=0 a3=ffffbd7eb6c0 items=0 ppid=2664 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:08.362937 kernel: audit: type=1325 audit(1707503768.311:1382): table=filter:129 family=2 entries=8 op=nft_register_rule pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:08.363056 kernel: audit: type=1300 audit(1707503768.311:1382): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff827c430 a2=0 a3=ffffbd7eb6c0 items=0 ppid=2664 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:08.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:08.378417 kernel: audit: type=1327 audit(1707503768.311:1382): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:08.318000 audit[4988]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:08.318000 audit[4988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=fffff827c430 a2=0 a3=ffffbd7eb6c0 items=0 ppid=2664 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:08.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:08.397519 kernel: audit: type=1325 audit(1707503768.318:1383): table=nat:130 family=2 entries=34 op=nft_register_chain pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:08.686489 systemd[1]: run-containerd-runc-k8s.io-7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a-runc.6hvWfl.mount: Deactivated successfully. Feb 9 18:36:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.483429 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 18:36:26.483543 kernel: audit: type=1400 audit(1707503786.476:1384): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4013391f60 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.542963 kernel: audit: type=1300 audit(1707503786.476:1384): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4013391f60 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.570890 kernel: audit: type=1327 audit(1707503786.476:1384): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.477000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.597493 kernel: audit: type=1400 audit(1707503786.477:1385): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.477000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40111a6d20 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.629622 kernel: audit: type=1300 audit(1707503786.477:1385): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40111a6d20 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.629746 kernel: audit: type=1327 audit(1707503786.477:1385): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.477000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.477000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.682367 kernel: audit: type=1400 audit(1707503786.477:1386): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.477000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40111a6d50 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.714012 kernel: audit: type=1300 audit(1707503786.477:1386): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40111a6d50 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.714136 kernel: audit: type=1327 audit(1707503786.477:1386): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.477000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.487000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.767803 kernel: audit: type=1400 audit(1707503786.487:1387): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.487000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=401205eba0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.487000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.498000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.498000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4011dccfa0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:26.499000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:26.499000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40111a6e40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:36:26.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:36:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001092020 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40008ac690 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:34.093283 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.h4zmKz.mount: Deactivated successfully. Feb 9 18:36:35.165828 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.qMkSCH.mount: Deactivated successfully. Feb 9 18:36:37.684036 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.1V8rw8.mount: Deactivated successfully. Feb 9 18:36:38.267930 systemd[1]: run-containerd-runc-k8s.io-7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a-runc.sRaTW7.mount: Deactivated successfully. Feb 9 18:36:41.381000 audit[4806]: AVC avc: denied { watch } for pid=4806 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_37.3049246729/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c420 tclass=file permissive=0 Feb 9 18:36:41.387970 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 18:36:41.388101 kernel: audit: type=1400 audit(1707503801.381:1392): avc: denied { watch } for pid=4806 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_37.3049246729/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c420 tclass=file permissive=0 Feb 9 18:36:41.381000 audit[4806]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400064f360 a2=fc6 a3=0 items=0 ppid=4673 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 key=(null) Feb 9 18:36:41.447375 kernel: audit: type=1300 audit(1707503801.381:1392): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400064f360 a2=fc6 a3=0 items=0 ppid=4673 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 key=(null) Feb 9 18:36:41.381000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:41.475786 kernel: audit: type=1327 audit(1707503801.381:1392): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:41.768000 audit[4847]: AVC avc: denied { watch } for pid=4847 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_38.3790498404/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c697 tclass=file permissive=0 Feb 9 18:36:41.768000 audit[4847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000927460 a2=fc6 a3=0 items=0 ppid=4753 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 key=(null) Feb 9 18:36:41.828355 kernel: audit: type=1400 audit(1707503801.768:1393): avc: denied { watch } for pid=4847 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_38.3790498404/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c697 tclass=file permissive=0 Feb 9 18:36:41.828488 kernel: audit: type=1300 audit(1707503801.768:1393): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000927460 a2=fc6 a3=0 items=0 ppid=4753 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 key=(null) Feb 9 18:36:41.768000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:41.856269 kernel: audit: type=1327 audit(1707503801.768:1393): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:44.902000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:44.902000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012bef00 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:44.962627 kernel: audit: type=1400 audit(1707503804.902:1394): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:44.962742 kernel: audit: type=1300 audit(1707503804.902:1394): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012bef00 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:44.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:44.990999 kernel: audit: type=1327 audit(1707503804.902:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:44.903000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:45.016646 kernel: audit: type=1400 audit(1707503804.903:1395): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:44.903000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012bef20 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:44.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:44.926000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:44.926000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:44.926000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40012bf060 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:44.926000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001092ec0 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:36:44.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:44.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:01.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:01.191607 systemd[1]: Started sshd@7-10.200.20.4:22-10.200.12.6:38936.service. Feb 9 18:37:01.197526 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 18:37:01.197676 kernel: audit: type=1130 audit(1707503821.191:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:01.662000 audit[5110]: USER_ACCT pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.663114 sshd[5110]: Accepted publickey for core from 10.200.12.6 port 38936 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:01.691584 kernel: audit: type=1101 audit(1707503821.662:1399): pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.691000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.692436 sshd[5110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:01.736144 kernel: audit: type=1103 audit(1707503821.691:1400): pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.736245 kernel: audit: type=1006 audit(1707503821.691:1401): pid=5110 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 18:37:01.691000 audit[5110]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5662e50 a2=3 a3=1 items=0 ppid=1 pid=5110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.764028 kernel: audit: type=1300 audit(1707503821.691:1401): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5662e50 a2=3 a3=1 items=0 ppid=1 pid=5110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.764592 systemd-logind[1341]: New session 10 of user core. Feb 9 18:37:01.691000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:01.769459 systemd[1]: Started session-10.scope. Feb 9 18:37:01.776495 kernel: audit: type=1327 audit(1707503821.691:1401): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:01.778000 audit[5110]: USER_START pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.779000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.832648 kernel: audit: type=1105 audit(1707503821.778:1402): pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.832865 kernel: audit: type=1103 audit(1707503821.779:1403): pid=5112 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.212534 sshd[5110]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:02.213000 audit[5110]: USER_END pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.221285 systemd[1]: sshd@7-10.200.20.4:22-10.200.12.6:38936.service: Deactivated successfully. Feb 9 18:37:02.222132 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 18:37:02.223345 systemd-logind[1341]: Session 10 logged out. Waiting for processes to exit. Feb 9 18:37:02.224295 systemd-logind[1341]: Removed session 10. Feb 9 18:37:02.213000 audit[5110]: CRED_DISP pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.275243 kernel: audit: type=1106 audit(1707503822.213:1404): pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.275379 kernel: audit: type=1104 audit(1707503822.213:1405): pid=5110 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.12.6:38936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:07.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:44356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:07.282759 systemd[1]: Started sshd@8-10.200.20.4:22-10.200.12.6:44356.service. Feb 9 18:37:07.288457 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:07.288609 kernel: audit: type=1130 audit(1707503827.281:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:44356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:07.719000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.721221 sshd[5184]: Accepted publickey for core from 10.200.12.6 port 44356 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:07.748000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.750258 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:07.775637 kernel: audit: type=1101 audit(1707503827.719:1408): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.776036 kernel: audit: type=1103 audit(1707503827.748:1409): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.776078 kernel: audit: type=1006 audit(1707503827.748:1410): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 18:37:07.748000 audit[5184]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc341a80 a2=3 a3=1 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.796267 systemd[1]: Started session-11.scope. Feb 9 18:37:07.797439 systemd-logind[1341]: New session 11 of user core. Feb 9 18:37:07.819674 kernel: audit: type=1300 audit(1707503827.748:1410): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc341a80 a2=3 a3=1 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:07.829296 kernel: audit: type=1327 audit(1707503827.748:1410): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:07.801000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.860130 kernel: audit: type=1105 audit(1707503827.801:1411): pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.803000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.884867 kernel: audit: type=1103 audit(1707503827.803:1412): pid=5206 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.108679 sshd[5184]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:08.108000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.112090 systemd-logind[1341]: Session 11 logged out. Waiting for processes to exit. Feb 9 18:37:08.113377 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 18:37:08.115433 systemd-logind[1341]: Removed session 11. Feb 9 18:37:08.116134 systemd[1]: sshd@8-10.200.20.4:22-10.200.12.6:44356.service: Deactivated successfully. Feb 9 18:37:08.109000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.162493 kernel: audit: type=1106 audit(1707503828.108:1413): pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.162606 kernel: audit: type=1104 audit(1707503828.109:1414): pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.12.6:44356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:13.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:44372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:13.176054 systemd[1]: Started sshd@9-10.200.20.4:22-10.200.12.6:44372.service. Feb 9 18:37:13.182454 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:13.182553 kernel: audit: type=1130 audit(1707503833.174:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:44372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:13.603000 audit[5236]: USER_ACCT pid=5236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.605046 sshd[5236]: Accepted publickey for core from 10.200.12.6 port 44372 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:13.632507 kernel: audit: type=1101 audit(1707503833.603:1417): pid=5236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.631000 audit[5236]: CRED_ACQ pid=5236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.633279 sshd[5236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:13.675626 kernel: audit: type=1103 audit(1707503833.631:1418): pid=5236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.675777 kernel: audit: type=1006 audit(1707503833.631:1419): pid=5236 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 18:37:13.631000 audit[5236]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd86b600 a2=3 a3=1 items=0 ppid=1 pid=5236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:13.702839 kernel: audit: type=1300 audit(1707503833.631:1419): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd86b600 a2=3 a3=1 items=0 ppid=1 pid=5236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:13.631000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:13.706496 systemd[1]: Started session-12.scope. Feb 9 18:37:13.707171 systemd-logind[1341]: New session 12 of user core. Feb 9 18:37:13.713356 kernel: audit: type=1327 audit(1707503833.631:1419): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:13.713421 kernel: audit: type=1105 audit(1707503833.710:1420): pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.710000 audit[5236]: USER_START pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.712000 audit[5238]: CRED_ACQ pid=5238 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.766335 kernel: audit: type=1103 audit(1707503833.712:1421): pid=5238 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.010711 sshd[5236]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:14.010000 audit[5236]: USER_END pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.014258 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 18:37:14.015105 systemd[1]: sshd@9-10.200.20.4:22-10.200.12.6:44372.service: Deactivated successfully. Feb 9 18:37:14.011000 audit[5236]: CRED_DISP pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.042953 systemd-logind[1341]: Session 12 logged out. Waiting for processes to exit. Feb 9 18:37:14.043823 systemd-logind[1341]: Removed session 12. Feb 9 18:37:14.066615 kernel: audit: type=1106 audit(1707503834.010:1422): pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.066727 kernel: audit: type=1104 audit(1707503834.011:1423): pid=5236 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.12.6:44372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:19.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:19.088624 systemd[1]: Started sshd@10-10.200.20.4:22-10.200.12.6:47212.service. Feb 9 18:37:19.094405 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:19.094530 kernel: audit: type=1130 audit(1707503839.088:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:19.525000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.526237 sshd[5251]: Accepted publickey for core from 10.200.12.6 port 47212 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:19.553566 kernel: audit: type=1101 audit(1707503839.525:1426): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.553680 kernel: audit: type=1103 audit(1707503839.552:1427): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.552000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.554173 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:19.559158 systemd[1]: Started session-13.scope. Feb 9 18:37:19.560499 systemd-logind[1341]: New session 13 of user core. Feb 9 18:37:19.594543 kernel: audit: type=1006 audit(1707503839.552:1428): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 18:37:19.594669 kernel: audit: type=1300 audit(1707503839.552:1428): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaeef420 a2=3 a3=1 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:19.552000 audit[5251]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaeef420 a2=3 a3=1 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:19.552000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:19.630242 kernel: audit: type=1327 audit(1707503839.552:1428): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:19.630349 kernel: audit: type=1105 audit(1707503839.564:1429): pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.564000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.565000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.683731 kernel: audit: type=1103 audit(1707503839.565:1430): pid=5253 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.931705 sshd[5251]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:19.932000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.934953 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 18:37:19.935687 systemd[1]: sshd@10-10.200.20.4:22-10.200.12.6:47212.service: Deactivated successfully. Feb 9 18:37:19.933000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.988911 kernel: audit: type=1106 audit(1707503839.932:1431): pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.989010 kernel: audit: type=1104 audit(1707503839.933:1432): pid=5251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:19.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.12.6:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:19.989101 systemd-logind[1341]: Session 13 logged out. Waiting for processes to exit. Feb 9 18:37:19.989852 systemd-logind[1341]: Removed session 13. Feb 9 18:37:19.998911 systemd[1]: Started sshd@11-10.200.20.4:22-10.200.12.6:47224.service. Feb 9 18:37:19.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.12.6:47224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:20.402000 audit[5264]: USER_ACCT pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:20.403204 sshd[5264]: Accepted publickey for core from 10.200.12.6 port 47224 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:20.403000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:20.404000 audit[5264]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8fb2400 a2=3 a3=1 items=0 ppid=1 pid=5264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:20.404000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:20.404839 sshd[5264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:20.408771 systemd-logind[1341]: New session 14 of user core. Feb 9 18:37:20.409182 systemd[1]: Started session-14.scope. Feb 9 18:37:20.412000 audit[5264]: USER_START pid=5264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:20.414000 audit[5266]: CRED_ACQ pid=5266 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:21.711319 sshd[5264]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:21.711000 audit[5264]: USER_END pid=5264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:21.711000 audit[5264]: CRED_DISP pid=5264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:21.714154 systemd-logind[1341]: Session 14 logged out. Waiting for processes to exit. Feb 9 18:37:21.714316 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 18:37:21.715408 systemd-logind[1341]: Removed session 14. Feb 9 18:37:21.715680 systemd[1]: sshd@11-10.200.20.4:22-10.200.12.6:47224.service: Deactivated successfully. Feb 9 18:37:21.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.12.6:47224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:21.779122 systemd[1]: Started sshd@12-10.200.20.4:22-10.200.12.6:47240.service. Feb 9 18:37:21.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.12.6:47240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:22.188000 audit[5293]: USER_ACCT pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.189134 sshd[5293]: Accepted publickey for core from 10.200.12.6 port 47240 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:22.189000 audit[5293]: CRED_ACQ pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.189000 audit[5293]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9e807c0 a2=3 a3=1 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:22.190736 sshd[5293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:22.195035 systemd-logind[1341]: New session 15 of user core. Feb 9 18:37:22.195734 systemd[1]: Started session-15.scope. Feb 9 18:37:22.206000 audit[5293]: USER_START pid=5293 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.208000 audit[5295]: CRED_ACQ pid=5295 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.576400 sshd[5293]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:22.578000 audit[5293]: USER_END pid=5293 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.578000 audit[5293]: CRED_DISP pid=5293 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:22.580280 systemd[1]: sshd@12-10.200.20.4:22-10.200.12.6:47240.service: Deactivated successfully. Feb 9 18:37:22.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.12.6:47240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:22.581113 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 18:37:22.581811 systemd-logind[1341]: Session 15 logged out. Waiting for processes to exit. Feb 9 18:37:22.582910 systemd-logind[1341]: Removed session 15. Feb 9 18:37:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.483715 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 18:37:26.483795 kernel: audit: type=1400 audit(1707503846.476:1452): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0930 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.541112 kernel: audit: type=1300 audit(1707503846.476:1452): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0930 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.568899 kernel: audit: type=1327 audit(1707503846.476:1452): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.594996 kernel: audit: type=1400 audit(1707503846.476:1454): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0960 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.627519 kernel: audit: type=1300 audit(1707503846.476:1454): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0960 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.654510 kernel: audit: type=1327 audit(1707503846.476:1454): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.476000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.476000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400441cb60 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.710923 kernel: audit: type=1400 audit(1707503846.476:1453): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.710997 kernel: audit: type=1300 audit(1707503846.476:1453): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400441cb60 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.738191 kernel: audit: type=1327 audit(1707503846.476:1453): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.487000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.765085 kernel: audit: type=1400 audit(1707503846.487:1455): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.487000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0c90 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.487000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.499000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.499000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40080f0cc0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:26.499000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:26.499000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400441cce0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:37:26.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:37:27.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.12.6:36894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:27.649832 systemd[1]: Started sshd@13-10.200.20.4:22-10.200.12.6:36894.service. Feb 9 18:37:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40025cae10 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400292d480 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:28.081000 audit[5308]: USER_ACCT pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.083207 sshd[5308]: Accepted publickey for core from 10.200.12.6 port 36894 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:28.083000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.083000 audit[5308]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9256ac0 a2=3 a3=1 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:28.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:28.084879 sshd[5308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:28.089240 systemd[1]: Started session-16.scope. Feb 9 18:37:28.089566 systemd-logind[1341]: New session 16 of user core. Feb 9 18:37:28.092000 audit[5308]: USER_START pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.093000 audit[5310]: CRED_ACQ pid=5310 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.482944 sshd[5308]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:28.482000 audit[5308]: USER_END pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.482000 audit[5308]: CRED_DISP pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:28.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.12.6:36894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:28.486230 systemd[1]: sshd@13-10.200.20.4:22-10.200.12.6:36894.service: Deactivated successfully. Feb 9 18:37:28.487036 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 18:37:28.487416 systemd-logind[1341]: Session 16 logged out. Waiting for processes to exit. Feb 9 18:37:28.488346 systemd-logind[1341]: Removed session 16. Feb 9 18:37:33.583213 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 18:37:33.583347 kernel: audit: type=1130 audit(1707503853.551:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.12.6:36910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:33.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.12.6:36910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:33.552765 systemd[1]: Started sshd@14-10.200.20.4:22-10.200.12.6:36910.service. Feb 9 18:37:33.960000 audit[5323]: USER_ACCT pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:33.962504 sshd[5323]: Accepted publickey for core from 10.200.12.6 port 36910 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:33.964278 sshd[5323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:33.962000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.014016 kernel: audit: type=1101 audit(1707503853.960:1470): pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.014250 kernel: audit: type=1103 audit(1707503853.962:1471): pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.017174 systemd[1]: Started session-17.scope. Feb 9 18:37:34.018602 systemd-logind[1341]: New session 17 of user core. Feb 9 18:37:34.030534 kernel: audit: type=1006 audit(1707503853.962:1472): pid=5323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 18:37:33.962000 audit[5323]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe90926f0 a2=3 a3=1 items=0 ppid=1 pid=5323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:34.057735 kernel: audit: type=1300 audit(1707503853.962:1472): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe90926f0 a2=3 a3=1 items=0 ppid=1 pid=5323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:33.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:34.070804 kernel: audit: type=1327 audit(1707503853.962:1472): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:34.070926 kernel: audit: type=1105 audit(1707503854.029:1473): pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.029000 audit[5323]: USER_START pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.031000 audit[5325]: CRED_ACQ pid=5325 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.123292 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.7GFZWH.mount: Deactivated successfully. Feb 9 18:37:34.126411 kernel: audit: type=1103 audit(1707503854.031:1474): pid=5325 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.341695 sshd[5323]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:34.341000 audit[5323]: USER_END pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.341000 audit[5323]: CRED_DISP pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.398997 kernel: audit: type=1106 audit(1707503854.341:1475): pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.399098 kernel: audit: type=1104 audit(1707503854.341:1476): pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:34.399970 systemd[1]: sshd@14-10.200.20.4:22-10.200.12.6:36910.service: Deactivated successfully. Feb 9 18:37:34.400894 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 18:37:34.404549 systemd-logind[1341]: Session 17 logged out. Waiting for processes to exit. Feb 9 18:37:34.405614 systemd-logind[1341]: Removed session 17. Feb 9 18:37:34.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.12.6:36910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:35.165633 systemd[1]: run-containerd-runc-k8s.io-ffeef124cbf77caf7b283b0a5abe296a8fe22a01d4911902ba168350546f5631-runc.TtUnDk.mount: Deactivated successfully. Feb 9 18:37:37.685870 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.TfQuEA.mount: Deactivated successfully. Feb 9 18:37:38.679419 systemd[1]: run-containerd-runc-k8s.io-7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a-runc.gxJ2kj.mount: Deactivated successfully. Feb 9 18:37:39.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.12.6:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:39.414992 systemd[1]: Started sshd@15-10.200.20.4:22-10.200.12.6:52112.service. Feb 9 18:37:39.420712 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:39.420815 kernel: audit: type=1130 audit(1707503859.414:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.12.6:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:39.849000 audit[5420]: USER_ACCT pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:39.850610 sshd[5420]: Accepted publickey for core from 10.200.12.6 port 52112 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:39.877520 kernel: audit: type=1101 audit(1707503859.849:1479): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:39.877000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:39.878633 sshd[5420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:39.919738 kernel: audit: type=1103 audit(1707503859.877:1480): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:39.919907 kernel: audit: type=1006 audit(1707503859.877:1481): pid=5420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 18:37:39.919938 kernel: audit: type=1300 audit(1707503859.877:1481): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7df45f0 a2=3 a3=1 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:39.877000 audit[5420]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7df45f0 a2=3 a3=1 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:39.947508 kernel: audit: type=1327 audit(1707503859.877:1481): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:39.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:39.950919 systemd[1]: Started session-18.scope. Feb 9 18:37:39.952554 systemd-logind[1341]: New session 18 of user core. Feb 9 18:37:39.957000 audit[5420]: USER_START pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:39.964000 audit[5424]: CRED_ACQ pid=5424 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.011252 kernel: audit: type=1105 audit(1707503859.957:1482): pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.011379 kernel: audit: type=1103 audit(1707503859.964:1483): pid=5424 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.275575 sshd[5420]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:40.276000 audit[5420]: USER_END pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.282364 systemd-logind[1341]: Session 18 logged out. Waiting for processes to exit. Feb 9 18:37:40.283579 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 18:37:40.284825 systemd-logind[1341]: Removed session 18. Feb 9 18:37:40.285435 systemd[1]: sshd@15-10.200.20.4:22-10.200.12.6:52112.service: Deactivated successfully. Feb 9 18:37:40.280000 audit[5420]: CRED_DISP pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.331249 kernel: audit: type=1106 audit(1707503860.276:1484): pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.331367 kernel: audit: type=1104 audit(1707503860.280:1485): pid=5420 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.12.6:52112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:40.347962 systemd[1]: Started sshd@16-10.200.20.4:22-10.200.12.6:52124.service. Feb 9 18:37:40.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.12.6:52124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:40.786000 audit[5436]: USER_ACCT pid=5436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.787352 sshd[5436]: Accepted publickey for core from 10.200.12.6 port 52124 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:40.788000 audit[5436]: CRED_ACQ pid=5436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.788000 audit[5436]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee5a7270 a2=3 a3=1 items=0 ppid=1 pid=5436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:40.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:40.788934 sshd[5436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:40.793668 systemd-logind[1341]: New session 19 of user core. Feb 9 18:37:40.794267 systemd[1]: Started session-19.scope. Feb 9 18:37:40.798000 audit[5436]: USER_START pid=5436 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:40.799000 audit[5438]: CRED_ACQ pid=5438 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.238575 sshd[5436]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:41.239000 audit[5436]: USER_END pid=5436 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.239000 audit[5436]: CRED_DISP pid=5436 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.241325 systemd-logind[1341]: Session 19 logged out. Waiting for processes to exit. Feb 9 18:37:41.241515 systemd[1]: sshd@16-10.200.20.4:22-10.200.12.6:52124.service: Deactivated successfully. Feb 9 18:37:41.242260 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 18:37:41.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.12.6:52124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:41.243136 systemd-logind[1341]: Removed session 19. Feb 9 18:37:41.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.12.6:52128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:41.305554 systemd[1]: Started sshd@17-10.200.20.4:22-10.200.12.6:52128.service. Feb 9 18:37:41.383000 audit[4806]: AVC avc: denied { watch } for pid=4806 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_37.3049246729/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c420 tclass=file permissive=0 Feb 9 18:37:41.383000 audit[4806]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c06ca0 a2=fc6 a3=0 items=0 ppid=4673 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 key=(null) Feb 9 18:37:41.383000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:37:41.706000 audit[5445]: USER_ACCT pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.707717 sshd[5445]: Accepted publickey for core from 10.200.12.6 port 52128 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:41.709165 sshd[5445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:41.708000 audit[5445]: CRED_ACQ pid=5445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.708000 audit[5445]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1f73cc0 a2=3 a3=1 items=0 ppid=1 pid=5445 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:41.708000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:41.713907 systemd[1]: Started session-20.scope. Feb 9 18:37:41.714210 systemd-logind[1341]: New session 20 of user core. Feb 9 18:37:41.718000 audit[5445]: USER_START pid=5445 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.719000 audit[5447]: CRED_ACQ pid=5447 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.771000 audit[4847]: AVC avc: denied { watch } for pid=4847 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_38.3790498404/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c697 tclass=file permissive=0 Feb 9 18:37:41.771000 audit[4847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400195e5c0 a2=fc6 a3=0 items=0 ppid=4753 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 key=(null) Feb 9 18:37:41.771000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:37:42.713000 audit[5462]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:42.713000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff172fc90 a2=0 a3=ffffb41426c0 items=0 ppid=2664 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:42.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:42.714000 audit[5462]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:42.714000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffff172fc90 a2=0 a3=ffffb41426c0 items=0 ppid=2664 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:42.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:42.728000 audit[5464]: NETFILTER_CFG table=filter:133 family=2 entries=32 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:42.728000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffce236260 a2=0 a3=ffff8cb7d6c0 items=0 ppid=2664 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:42.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:42.730000 audit[5464]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:42.730000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffce236260 a2=0 a3=ffff8cb7d6c0 items=0 ppid=2664 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:42.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:42.817908 sshd[5445]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:42.818000 audit[5445]: USER_END pid=5445 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.818000 audit[5445]: CRED_DISP pid=5445 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.820874 systemd[1]: sshd@17-10.200.20.4:22-10.200.12.6:52128.service: Deactivated successfully. Feb 9 18:37:42.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.12.6:52128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:42.821688 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 18:37:42.822259 systemd-logind[1341]: Session 20 logged out. Waiting for processes to exit. Feb 9 18:37:42.823051 systemd-logind[1341]: Removed session 20. Feb 9 18:37:42.885370 systemd[1]: Started sshd@18-10.200.20.4:22-10.200.12.6:52130.service. Feb 9 18:37:42.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.12.6:52130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:43.295000 audit[5468]: USER_ACCT pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.296148 sshd[5468]: Accepted publickey for core from 10.200.12.6 port 52130 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:43.296000 audit[5468]: CRED_ACQ pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.297000 audit[5468]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe207e8b0 a2=3 a3=1 items=0 ppid=1 pid=5468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:43.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:43.297957 sshd[5468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:43.302759 systemd[1]: Started session-21.scope. Feb 9 18:37:43.303564 systemd-logind[1341]: New session 21 of user core. Feb 9 18:37:43.307000 audit[5468]: USER_START pid=5468 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.308000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.868343 sshd[5468]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:43.869000 audit[5468]: USER_END pid=5468 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.869000 audit[5468]: CRED_DISP pid=5468 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:43.871935 systemd-logind[1341]: Session 21 logged out. Waiting for processes to exit. Feb 9 18:37:43.873273 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 18:37:43.874585 systemd-logind[1341]: Removed session 21. Feb 9 18:37:43.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.12.6:52130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:43.875170 systemd[1]: sshd@18-10.200.20.4:22-10.200.12.6:52130.service: Deactivated successfully. Feb 9 18:37:43.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:52140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:43.936624 systemd[1]: Started sshd@19-10.200.20.4:22-10.200.12.6:52140.service. Feb 9 18:37:44.345000 audit[5478]: USER_ACCT pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.346035 sshd[5478]: Accepted publickey for core from 10.200.12.6 port 52140 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:44.346000 audit[5478]: CRED_ACQ pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.347000 audit[5478]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2ee0c40 a2=3 a3=1 items=0 ppid=1 pid=5478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:44.347000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:44.348039 sshd[5478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:44.352136 systemd-logind[1341]: New session 22 of user core. Feb 9 18:37:44.352633 systemd[1]: Started session-22.scope. Feb 9 18:37:44.359000 audit[5478]: USER_START pid=5478 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.360000 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.703751 sshd[5478]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:44.704000 audit[5478]: USER_END pid=5478 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.706347 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 18:37:44.707138 systemd[1]: sshd@19-10.200.20.4:22-10.200.12.6:52140.service: Deactivated successfully. Feb 9 18:37:44.710454 kernel: kauditd_printk_skb: 60 callbacks suppressed Feb 9 18:37:44.710536 kernel: audit: type=1106 audit(1707503864.704:1526): pid=5478 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.711404 systemd-logind[1341]: Session 22 logged out. Waiting for processes to exit. Feb 9 18:37:44.712420 systemd-logind[1341]: Removed session 22. Feb 9 18:37:44.704000 audit[5478]: CRED_DISP pid=5478 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.765344 kernel: audit: type=1104 audit(1707503864.704:1527): pid=5478 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:44.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:52140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:44.789794 kernel: audit: type=1131 audit(1707503864.704:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.12.6:52140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:44.904000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:44.904000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d2a020 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.965398 kernel: audit: type=1400 audit(1707503864.904:1529): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:44.965588 kernel: audit: type=1300 audit(1707503864.904:1529): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d2a020 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:44.993194 kernel: audit: type=1327 audit(1707503864.904:1529): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:44.906000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:45.018292 kernel: audit: type=1400 audit(1707503864.906:1530): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:45.018453 kernel: audit: type=1300 audit(1707503864.906:1530): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8a180 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.906000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8a180 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:45.080125 kernel: audit: type=1327 audit(1707503864.906:1530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:44.928000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:45.105409 kernel: audit: type=1400 audit(1707503864.928:1531): avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:44.928000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8a420 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:44.928000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:44.928000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012bfd80 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:37:44.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:49.299000 audit[5493]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:49.299000 audit[5493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff6d5fff0 a2=0 a3=ffffa885b6c0 items=0 ppid=2664 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:49.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:49.302000 audit[5493]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5493 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:49.302000 audit[5493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=fffff6d5fff0 a2=0 a3=ffffa885b6c0 items=0 ppid=2664 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:49.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:49.801628 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 9 18:37:49.801730 kernel: audit: type=1130 audit(1707503869.770:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:43238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:49.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:43238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:49.771846 systemd[1]: Started sshd@20-10.200.20.4:22-10.200.12.6:43238.service. Feb 9 18:37:50.172000 audit[5496]: USER_ACCT pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.174382 sshd[5496]: Accepted publickey for core from 10.200.12.6 port 43238 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:50.175992 sshd[5496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:50.174000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.227828 kernel: audit: type=1101 audit(1707503870.172:1536): pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.227932 kernel: audit: type=1103 audit(1707503870.174:1537): pid=5496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.245611 kernel: audit: type=1006 audit(1707503870.174:1538): pid=5496 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 18:37:50.174000 audit[5496]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc270dd20 a2=3 a3=1 items=0 ppid=1 pid=5496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.273172 kernel: audit: type=1300 audit(1707503870.174:1538): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc270dd20 a2=3 a3=1 items=0 ppid=1 pid=5496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:50.275839 systemd[1]: Started session-23.scope. Feb 9 18:37:50.277106 systemd-logind[1341]: New session 23 of user core. Feb 9 18:37:50.283838 kernel: audit: type=1327 audit(1707503870.174:1538): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:50.283908 kernel: audit: type=1105 audit(1707503870.280:1539): pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.280000 audit[5496]: USER_START pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.281000 audit[5498]: CRED_ACQ pid=5498 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.336348 kernel: audit: type=1103 audit(1707503870.281:1540): pid=5498 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.571781 sshd[5496]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:50.572000 audit[5496]: USER_END pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.576136 systemd-logind[1341]: Session 23 logged out. Waiting for processes to exit. Feb 9 18:37:50.577356 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 18:37:50.578681 systemd-logind[1341]: Removed session 23. Feb 9 18:37:50.579381 systemd[1]: sshd@20-10.200.20.4:22-10.200.12.6:43238.service: Deactivated successfully. Feb 9 18:37:50.572000 audit[5496]: CRED_DISP pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.628411 kernel: audit: type=1106 audit(1707503870.572:1541): pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.629053 kernel: audit: type=1104 audit(1707503870.572:1542): pid=5496 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:50.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.12.6:43238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:55.646372 systemd[1]: Started sshd@21-10.200.20.4:22-10.200.12.6:43250.service. Feb 9 18:37:55.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.12.6:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:55.652949 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:55.653047 kernel: audit: type=1130 audit(1707503875.645:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.12.6:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:56.082000 audit[5515]: USER_ACCT pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.084410 sshd[5515]: Accepted publickey for core from 10.200.12.6 port 43250 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:56.111557 kernel: audit: type=1101 audit(1707503876.082:1545): pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.110000 audit[5515]: CRED_ACQ pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.112574 sshd[5515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:56.117556 systemd[1]: Started session-24.scope. Feb 9 18:37:56.118952 systemd-logind[1341]: New session 24 of user core. Feb 9 18:37:56.154380 kernel: audit: type=1103 audit(1707503876.110:1546): pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.154535 kernel: audit: type=1006 audit(1707503876.110:1547): pid=5515 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 18:37:56.154567 kernel: audit: type=1300 audit(1707503876.110:1547): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d92840 a2=3 a3=1 items=0 ppid=1 pid=5515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:56.110000 audit[5515]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d92840 a2=3 a3=1 items=0 ppid=1 pid=5515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:56.110000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:56.190934 kernel: audit: type=1327 audit(1707503876.110:1547): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:56.191067 kernel: audit: type=1105 audit(1707503876.137:1548): pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.137000 audit[5515]: USER_START pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.139000 audit[5517]: CRED_ACQ pid=5517 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.245130 kernel: audit: type=1103 audit(1707503876.139:1549): pid=5517 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.493703 sshd[5515]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:56.493000 audit[5515]: USER_END pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.499095 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 18:37:56.499925 systemd[1]: sshd@21-10.200.20.4:22-10.200.12.6:43250.service: Deactivated successfully. Feb 9 18:37:56.496000 audit[5515]: CRED_DISP pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.548288 kernel: audit: type=1106 audit(1707503876.493:1550): pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.548411 kernel: audit: type=1104 audit(1707503876.496:1551): pid=5515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:56.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.12.6:43250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:56.548553 systemd-logind[1341]: Session 24 logged out. Waiting for processes to exit. Feb 9 18:37:56.549433 systemd-logind[1341]: Removed session 24. Feb 9 18:38:01.562721 systemd[1]: Started sshd@22-10.200.20.4:22-10.200.12.6:54760.service. Feb 9 18:38:01.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.12.6:54760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:01.574503 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:38:01.574562 kernel: audit: type=1130 audit(1707503881.562:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.12.6:54760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:01.968000 audit[5527]: USER_ACCT pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:01.969452 sshd[5527]: Accepted publickey for core from 10.200.12.6 port 54760 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:38:01.971210 sshd[5527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:38:01.970000 audit[5527]: CRED_ACQ pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:01.999506 systemd[1]: Started session-25.scope. Feb 9 18:38:02.000933 systemd-logind[1341]: New session 25 of user core. Feb 9 18:38:02.024239 kernel: audit: type=1101 audit(1707503881.968:1554): pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.024328 kernel: audit: type=1103 audit(1707503881.970:1555): pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.041058 kernel: audit: type=1006 audit(1707503881.970:1556): pid=5527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 18:38:01.970000 audit[5527]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc66e250 a2=3 a3=1 items=0 ppid=1 pid=5527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:02.068783 kernel: audit: type=1300 audit(1707503881.970:1556): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc66e250 a2=3 a3=1 items=0 ppid=1 pid=5527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:01.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:02.078418 kernel: audit: type=1327 audit(1707503881.970:1556): proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:02.078691 kernel: audit: type=1105 audit(1707503882.005:1557): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.005000 audit[5527]: USER_START pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.006000 audit[5529]: CRED_ACQ pid=5529 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.133725 kernel: audit: type=1103 audit(1707503882.006:1558): pid=5529 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.334555 sshd[5527]: pam_unix(sshd:session): session closed for user core Feb 9 18:38:02.335000 audit[5527]: USER_END pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.338099 systemd-logind[1341]: Session 25 logged out. Waiting for processes to exit. Feb 9 18:38:02.339264 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 18:38:02.340395 systemd-logind[1341]: Removed session 25. Feb 9 18:38:02.341076 systemd[1]: sshd@22-10.200.20.4:22-10.200.12.6:54760.service: Deactivated successfully. Feb 9 18:38:02.335000 audit[5527]: CRED_DISP pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.393609 kernel: audit: type=1106 audit(1707503882.335:1559): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.393750 kernel: audit: type=1104 audit(1707503882.335:1560): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:02.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.12.6:54760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:04.094697 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.l0FAoe.mount: Deactivated successfully. Feb 9 18:38:06.348848 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.Zuu1EF.mount: Deactivated successfully. Feb 9 18:38:07.404386 systemd[1]: Started sshd@23-10.200.20.4:22-10.200.12.6:35494.service. Feb 9 18:38:07.435097 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:38:07.435191 kernel: audit: type=1130 audit(1707503887.404:1562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.12.6:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:07.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.12.6:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:07.690662 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.m1VCDW.mount: Deactivated successfully. Feb 9 18:38:07.811000 audit[5605]: USER_ACCT pid=5605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.812308 sshd[5605]: Accepted publickey for core from 10.200.12.6 port 35494 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:38:07.814056 sshd[5605]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:38:07.813000 audit[5605]: CRED_ACQ pid=5605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.863466 kernel: audit: type=1101 audit(1707503887.811:1563): pid=5605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.863614 kernel: audit: type=1103 audit(1707503887.813:1564): pid=5605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.879868 kernel: audit: type=1006 audit(1707503887.813:1565): pid=5605 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 18:38:07.813000 audit[5605]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3699770 a2=3 a3=1 items=0 ppid=1 pid=5605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:07.908565 kernel: audit: type=1300 audit(1707503887.813:1565): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3699770 a2=3 a3=1 items=0 ppid=1 pid=5605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:07.910194 kernel: audit: type=1327 audit(1707503887.813:1565): proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:07.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:07.911358 systemd[1]: Started session-26.scope. Feb 9 18:38:07.918247 systemd-logind[1341]: New session 26 of user core. Feb 9 18:38:07.922000 audit[5605]: USER_START pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.923000 audit[5627]: CRED_ACQ pid=5627 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.977405 kernel: audit: type=1105 audit(1707503887.922:1566): pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:07.977675 kernel: audit: type=1103 audit(1707503887.923:1567): pid=5627 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:08.226716 sshd[5605]: pam_unix(sshd:session): session closed for user core Feb 9 18:38:08.227000 audit[5605]: USER_END pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:08.261098 systemd[1]: sshd@23-10.200.20.4:22-10.200.12.6:35494.service: Deactivated successfully. Feb 9 18:38:08.261925 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 18:38:08.227000 audit[5605]: CRED_DISP pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:08.263143 systemd-logind[1341]: Session 26 logged out. Waiting for processes to exit. Feb 9 18:38:08.288582 kernel: audit: type=1106 audit(1707503888.227:1568): pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:08.288700 kernel: audit: type=1104 audit(1707503888.227:1569): pid=5605 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:08.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.12.6:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:08.290258 systemd-logind[1341]: Removed session 26. Feb 9 18:38:13.331507 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:38:13.331649 kernel: audit: type=1130 audit(1707503893.300:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.12.6:35504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:13.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.12.6:35504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:13.301063 systemd[1]: Started sshd@24-10.200.20.4:22-10.200.12.6:35504.service. Feb 9 18:38:13.734000 audit[5658]: USER_ACCT pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.736141 sshd[5658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:38:13.736778 sshd[5658]: Accepted publickey for core from 10.200.12.6 port 35504 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:38:13.735000 audit[5658]: CRED_ACQ pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.789512 kernel: audit: type=1101 audit(1707503893.734:1572): pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.789682 kernel: audit: type=1103 audit(1707503893.735:1573): pid=5658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.806809 kernel: audit: type=1006 audit(1707503893.735:1574): pid=5658 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 18:38:13.735000 audit[5658]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdde05210 a2=3 a3=1 items=0 ppid=1 pid=5658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:13.835614 kernel: audit: type=1300 audit(1707503893.735:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdde05210 a2=3 a3=1 items=0 ppid=1 pid=5658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:13.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:13.846196 kernel: audit: type=1327 audit(1707503893.735:1574): proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:13.850316 systemd-logind[1341]: New session 27 of user core. Feb 9 18:38:13.850935 systemd[1]: Started session-27.scope. Feb 9 18:38:13.858000 audit[5658]: USER_START pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.892000 audit[5660]: CRED_ACQ pid=5660 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.921296 kernel: audit: type=1105 audit(1707503893.858:1575): pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:13.921442 kernel: audit: type=1103 audit(1707503893.892:1576): pid=5660 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:14.208974 sshd[5658]: pam_unix(sshd:session): session closed for user core Feb 9 18:38:14.209000 audit[5658]: USER_END pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:14.209000 audit[5658]: CRED_DISP pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:14.240775 systemd[1]: sshd@24-10.200.20.4:22-10.200.12.6:35504.service: Deactivated successfully. Feb 9 18:38:14.241607 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 18:38:14.266169 kernel: audit: type=1106 audit(1707503894.209:1577): pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:14.266288 kernel: audit: type=1104 audit(1707503894.209:1578): pid=5658 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:14.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.12.6:35504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:14.266937 systemd-logind[1341]: Session 27 logged out. Waiting for processes to exit. Feb 9 18:38:14.267806 systemd-logind[1341]: Removed session 27. Feb 9 18:38:19.284432 systemd[1]: Started sshd@25-10.200.20.4:22-10.200.12.6:59696.service. Feb 9 18:38:19.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:19.290582 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:38:19.290677 kernel: audit: type=1130 audit(1707503899.283:1580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:19.727000 audit[5674]: USER_ACCT pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.729251 sshd[5674]: Accepted publickey for core from 10.200.12.6 port 59696 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:38:19.733116 sshd[5674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:38:19.731000 audit[5674]: CRED_ACQ pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.782393 kernel: audit: type=1101 audit(1707503899.727:1581): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.782528 kernel: audit: type=1103 audit(1707503899.731:1582): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.798611 kernel: audit: type=1006 audit(1707503899.731:1583): pid=5674 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 18:38:19.731000 audit[5674]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeea524b0 a2=3 a3=1 items=0 ppid=1 pid=5674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:19.826071 kernel: audit: type=1300 audit(1707503899.731:1583): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeea524b0 a2=3 a3=1 items=0 ppid=1 pid=5674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:19.731000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:19.835338 kernel: audit: type=1327 audit(1707503899.731:1583): proctitle=737368643A20636F7265205B707269765D Feb 9 18:38:19.838687 systemd[1]: Started session-28.scope. Feb 9 18:38:19.839395 systemd-logind[1341]: New session 28 of user core. Feb 9 18:38:19.842000 audit[5674]: USER_START pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.873000 audit[5676]: CRED_ACQ pid=5676 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.900293 kernel: audit: type=1105 audit(1707503899.842:1584): pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:19.900423 kernel: audit: type=1103 audit(1707503899.873:1585): pid=5676 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:20.185735 sshd[5674]: pam_unix(sshd:session): session closed for user core Feb 9 18:38:20.185000 audit[5674]: USER_END pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:20.186000 audit[5674]: CRED_DISP pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:20.217129 systemd[1]: sshd@25-10.200.20.4:22-10.200.12.6:59696.service: Deactivated successfully. Feb 9 18:38:20.217986 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 18:38:20.219437 systemd-logind[1341]: Session 28 logged out. Waiting for processes to exit. Feb 9 18:38:20.220393 systemd-logind[1341]: Removed session 28. Feb 9 18:38:20.241314 kernel: audit: type=1106 audit(1707503900.185:1586): pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:20.241468 kernel: audit: type=1104 audit(1707503900.186:1587): pid=5674 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:38:20.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.12.6:59696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:38:26.478000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.484623 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:38:26.484733 kernel: audit: type=1400 audit(1707503906.478:1589): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.478000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.536504 kernel: audit: type=1400 audit(1707503906.478:1590): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.478000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4003de74c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.569338 kernel: audit: type=1300 audit(1707503906.478:1590): arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4003de74c0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.569468 kernel: audit: type=1327 audit(1707503906.478:1590): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.478000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.622451 kernel: audit: type=1400 audit(1707503906.478:1591): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.478000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40094a4e40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.654038 kernel: audit: type=1300 audit(1707503906.478:1591): arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40094a4e40 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.654154 kernel: audit: type=1327 audit(1707503906.478:1591): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.478000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008fe4ba0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.712896 kernel: audit: type=1300 audit(1707503906.478:1589): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008fe4ba0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.740177 kernel: audit: type=1327 audit(1707503906.478:1589): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.740279 kernel: audit: type=1400 audit(1707503906.488:1592): avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.488000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.488000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40094a4f90 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.488000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.499000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.499000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4003de76a0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:26.499000 audit[2311]: AVC avc: denied { watch } for pid=2311 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:26.499000 audit[2311]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008fe4cf0 a2=fc6 a3=0 items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c913 key=(null) Feb 9 18:38:26.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 18:38:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002516900 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:38:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:27.877000 audit[2368]: AVC avc: denied { watch } for pid=2368 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:27.877000 audit[2368]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001241230 a2=fc6 a3=0 items=0 ppid=2192 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:38:27.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:34.096846 systemd[1]: run-containerd-runc-k8s.io-76d1811dc4b927025bd892011e97dba13a52c1514b0a40d43ea9ec4c24064dbb-runc.yzJ6rx.mount: Deactivated successfully. Feb 9 18:38:34.869901 systemd[1]: cri-containerd-d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8.scope: Deactivated successfully. Feb 9 18:38:34.870221 systemd[1]: cri-containerd-d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8.scope: Consumed 4.444s CPU time. Feb 9 18:38:34.873000 audit: BPF prog-id=88 op=UNLOAD Feb 9 18:38:34.879605 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 18:38:34.879698 kernel: audit: type=1334 audit(1707503914.873:1597): prog-id=88 op=UNLOAD Feb 9 18:38:34.873000 audit: BPF prog-id=100 op=UNLOAD Feb 9 18:38:34.894990 kernel: audit: type=1334 audit(1707503914.873:1598): prog-id=100 op=UNLOAD Feb 9 18:38:34.906177 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8-rootfs.mount: Deactivated successfully. Feb 9 18:38:34.907467 env[1353]: time="2024-02-09T18:38:34.907425586Z" level=info msg="shim disconnected" id=d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8 Feb 9 18:38:34.907892 env[1353]: time="2024-02-09T18:38:34.907866278Z" level=warning msg="cleaning up after shim disconnected" id=d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8 namespace=k8s.io Feb 9 18:38:34.907978 env[1353]: time="2024-02-09T18:38:34.907964921Z" level=info msg="cleaning up dead shim" Feb 9 18:38:34.915264 env[1353]: time="2024-02-09T18:38:34.915225851Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5731 runtime=io.containerd.runc.v2\n" Feb 9 18:38:35.064124 kubelet[2484]: I0209 18:38:35.062826 2484 scope.go:115] "RemoveContainer" containerID="d1719d404e74792107ce30359fdcd9dd253ff2c3527ed987e61bded68ab49ad8" Feb 9 18:38:35.066907 env[1353]: time="2024-02-09T18:38:35.066862783Z" level=info msg="CreateContainer within sandbox \"ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 18:38:35.092823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2534788488.mount: Deactivated successfully. Feb 9 18:38:35.110137 env[1353]: time="2024-02-09T18:38:35.110053904Z" level=info msg="CreateContainer within sandbox \"ca3f1dc3f6fc20f7bbc51252e32155f83295c3e37ade566e4f0769db4d64c6d7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"014b87b872a157222e2d1085d7a0525a59bd93484f67240c2617a8f13207a2ac\"" Feb 9 18:38:35.110844 env[1353]: time="2024-02-09T18:38:35.110821606Z" level=info msg="StartContainer for \"014b87b872a157222e2d1085d7a0525a59bd93484f67240c2617a8f13207a2ac\"" Feb 9 18:38:35.132350 systemd[1]: Started cri-containerd-014b87b872a157222e2d1085d7a0525a59bd93484f67240c2617a8f13207a2ac.scope. Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.185798 kernel: audit: type=1400 audit(1707503915.145:1599): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.185956 kernel: audit: type=1400 audit(1707503915.145:1600): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186064 kubelet[2484]: E0209 18:38:35.186019 2484 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.208425 kernel: audit: type=1400 audit(1707503915.145:1601): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.213500 kernel: audit: type=1400 audit(1707503915.145:1602): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.253760 kernel: audit: type=1400 audit(1707503915.145:1603): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.274588 kernel: audit: type=1400 audit(1707503915.145:1604): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.294757 kernel: audit: type=1400 audit(1707503915.145:1605): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.315430 kernel: audit: type=1400 audit(1707503915.145:1606): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.165000 audit: BPF prog-id=199 op=LOAD Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2192 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:35.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031346238376238373261313537323232653264313038356437613035 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2192 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:35.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031346238376238373261313537323232653264313038356437613035 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit: BPF prog-id=200 op=LOAD Feb 9 18:38:35.186000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2192 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:35.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031346238376238373261313537323232653264313038356437613035 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit: BPF prog-id=201 op=LOAD Feb 9 18:38:35.186000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2192 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:35.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031346238376238373261313537323232653264313038356437613035 Feb 9 18:38:35.186000 audit: BPF prog-id=201 op=UNLOAD Feb 9 18:38:35.186000 audit: BPF prog-id=200 op=UNLOAD Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:35.186000 audit: BPF prog-id=202 op=LOAD Feb 9 18:38:35.186000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2192 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:35.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031346238376238373261313537323232653264313038356437613035 Feb 9 18:38:35.328131 env[1353]: time="2024-02-09T18:38:35.328081969Z" level=info msg="StartContainer for \"014b87b872a157222e2d1085d7a0525a59bd93484f67240c2617a8f13207a2ac\" returns successfully" Feb 9 18:38:35.581000 audit: BPF prog-id=121 op=UNLOAD Feb 9 18:38:35.581978 systemd[1]: cri-containerd-40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341.scope: Deactivated successfully. Feb 9 18:38:35.582289 systemd[1]: cri-containerd-40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341.scope: Consumed 5.819s CPU time. Feb 9 18:38:35.584000 audit: BPF prog-id=124 op=UNLOAD Feb 9 18:38:35.607720 env[1353]: time="2024-02-09T18:38:35.607669923Z" level=info msg="shim disconnected" id=40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341 Feb 9 18:38:35.607720 env[1353]: time="2024-02-09T18:38:35.607719245Z" level=warning msg="cleaning up after shim disconnected" id=40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341 namespace=k8s.io Feb 9 18:38:35.607897 env[1353]: time="2024-02-09T18:38:35.607729125Z" level=info msg="cleaning up dead shim" Feb 9 18:38:35.614736 env[1353]: time="2024-02-09T18:38:35.614698085Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5813 runtime=io.containerd.runc.v2\n" Feb 9 18:38:36.069055 kubelet[2484]: I0209 18:38:36.068892 2484 scope.go:115] "RemoveContainer" containerID="40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341" Feb 9 18:38:36.071249 env[1353]: time="2024-02-09T18:38:36.071209552Z" level=info msg="CreateContainer within sandbox \"40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 18:38:36.089560 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341-rootfs.mount: Deactivated successfully. Feb 9 18:38:36.108286 env[1353]: time="2024-02-09T18:38:36.108245010Z" level=info msg="CreateContainer within sandbox \"40139d7a6052ab3f0eb130e329f4da467a2f6bca78099507eed275e7af50c991\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0\"" Feb 9 18:38:36.108917 env[1353]: time="2024-02-09T18:38:36.108885388Z" level=info msg="StartContainer for \"56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0\"" Feb 9 18:38:36.129907 systemd[1]: Started cri-containerd-56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0.scope. Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.149000 audit: BPF prog-id=203 op=LOAD Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2568 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:36.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536353437633138366633653266363030303465633363393936353665 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2568 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:36.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536353437633138366633653266363030303465633363393936353665 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.150000 audit: BPF prog-id=204 op=LOAD Feb 9 18:38:36.150000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2568 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:36.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536353437633138366633653266363030303465633363393936353665 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.151000 audit: BPF prog-id=205 op=LOAD Feb 9 18:38:36.151000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2568 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:36.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536353437633138366633653266363030303465633363393936353665 Feb 9 18:38:36.152000 audit: BPF prog-id=205 op=UNLOAD Feb 9 18:38:36.152000 audit: BPF prog-id=204 op=UNLOAD Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:36.152000 audit: BPF prog-id=206 op=LOAD Feb 9 18:38:36.152000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2568 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:36.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536353437633138366633653266363030303465633363393936353665 Feb 9 18:38:36.173528 env[1353]: time="2024-02-09T18:38:36.173466714Z" level=info msg="StartContainer for \"56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0\" returns successfully" Feb 9 18:38:36.853000 audit[5763]: AVC avc: denied { watch } for pid=5763 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:36.853000 audit[5763]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000664000 a2=fc6 a3=0 items=0 ppid=2192 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:38:36.853000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:36.853000 audit[5763]: AVC avc: denied { watch } for pid=5763 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521002 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:36.853000 audit[5763]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40001487e0 a2=fc6 a3=0 items=0 ppid=2192 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c620 key=(null) Feb 9 18:38:36.853000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:37.686257 systemd[1]: run-containerd-runc-k8s.io-0d29c9562384e4d70103f5834f3b06f7c962aa655af1c79f98ff3b1b866d458d-runc.auwxGx.mount: Deactivated successfully. Feb 9 18:38:38.152142 kubelet[2484]: E0209 18:38:38.151708 2484 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-9ade464be9.17b245c1e0b53795", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-9ade464be9", UID:"a03c1f3dc97bec89ce812fd916b33555", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-9ade464be9"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 38, 27, 727816597, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 38, 27, 727816597, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:47436->10.200.20.31:2379: read: connection timed out' (will not retry!) Feb 9 18:38:38.270151 systemd[1]: run-containerd-runc-k8s.io-7c6703d2cb9611d07638912d54102a355d3d6f5ea3b4deaa2425839dda17460a-runc.EHQqXN.mount: Deactivated successfully. Feb 9 18:38:39.468325 systemd[1]: cri-containerd-4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194.scope: Deactivated successfully. Feb 9 18:38:39.468648 systemd[1]: cri-containerd-4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194.scope: Consumed 2.356s CPU time. Feb 9 18:38:39.472000 audit: BPF prog-id=84 op=UNLOAD Feb 9 18:38:39.472000 audit: BPF prog-id=109 op=UNLOAD Feb 9 18:38:39.488293 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194-rootfs.mount: Deactivated successfully. Feb 9 18:38:39.489970 env[1353]: time="2024-02-09T18:38:39.489925925Z" level=info msg="shim disconnected" id=4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194 Feb 9 18:38:39.490310 env[1353]: time="2024-02-09T18:38:39.490289576Z" level=warning msg="cleaning up after shim disconnected" id=4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194 namespace=k8s.io Feb 9 18:38:39.490395 env[1353]: time="2024-02-09T18:38:39.490382418Z" level=info msg="cleaning up dead shim" Feb 9 18:38:39.498174 env[1353]: time="2024-02-09T18:38:39.498142756Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5916 runtime=io.containerd.runc.v2\n" Feb 9 18:38:40.080913 kubelet[2484]: I0209 18:38:40.080866 2484 scope.go:115] "RemoveContainer" containerID="4610ab4cfce95eab97a3f5b72767619da075ed5903e61b41cdf5e6418bb91194" Feb 9 18:38:40.083591 env[1353]: time="2024-02-09T18:38:40.083509873Z" level=info msg="CreateContainer within sandbox \"49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 18:38:40.114412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4285355683.mount: Deactivated successfully. Feb 9 18:38:40.120299 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount305765724.mount: Deactivated successfully. Feb 9 18:38:40.129978 env[1353]: time="2024-02-09T18:38:40.129934690Z" level=info msg="CreateContainer within sandbox \"49a227f3f806c1f3cec102b5e72a4279c58b39a2d49b5a2337fc0fce0165b56c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"b1389040415ddc1e16df22c7fb7c89af1658bce69d1c5ed9e5e62ee785557cb3\"" Feb 9 18:38:40.130770 env[1353]: time="2024-02-09T18:38:40.130742953Z" level=info msg="StartContainer for \"b1389040415ddc1e16df22c7fb7c89af1658bce69d1c5ed9e5e62ee785557cb3\"" Feb 9 18:38:40.145725 systemd[1]: Started cri-containerd-b1389040415ddc1e16df22c7fb7c89af1658bce69d1c5ed9e5e62ee785557cb3.scope. Feb 9 18:38:40.170510 kernel: kauditd_printk_skb: 116 callbacks suppressed Feb 9 18:38:40.170678 kernel: audit: type=1400 audit(1707503920.159:1641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.212589 kernel: audit: type=1400 audit(1707503920.159:1642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.233582 kernel: audit: type=1400 audit(1707503920.159:1643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.233713 kernel: audit: type=1400 audit(1707503920.159:1644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.273181 kernel: audit: type=1400 audit(1707503920.159:1645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.293147 kernel: audit: type=1400 audit(1707503920.159:1646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.312931 kernel: audit: type=1400 audit(1707503920.159:1647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.332608 kernel: audit: type=1400 audit(1707503920.159:1648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.332723 kernel: audit: type=1400 audit(1707503920.159:1649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.373678 kernel: audit: type=1400 audit(1707503920.165:1650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.165000 audit: BPF prog-id=207 op=LOAD Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2227 pid=5938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333839303430343135646463316531366466323263376662376338 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2227 pid=5938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333839303430343135646463316531366466323263376662376338 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit: BPF prog-id=208 op=LOAD Feb 9 18:38:40.184000 audit[5938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2227 pid=5938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333839303430343135646463316531366466323263376662376338 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit: BPF prog-id=209 op=LOAD Feb 9 18:38:40.184000 audit[5938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2227 pid=5938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333839303430343135646463316531366466323263376662376338 Feb 9 18:38:40.184000 audit: BPF prog-id=209 op=UNLOAD Feb 9 18:38:40.184000 audit: BPF prog-id=208 op=UNLOAD Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { perfmon } for pid=5938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit[5938]: AVC avc: denied { bpf } for pid=5938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:40.184000 audit: BPF prog-id=210 op=LOAD Feb 9 18:38:40.184000 audit[5938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2227 pid=5938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:40.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333839303430343135646463316531366466323263376662376338 Feb 9 18:38:40.376078 env[1353]: time="2024-02-09T18:38:40.374846015Z" level=info msg="StartContainer for \"b1389040415ddc1e16df22c7fb7c89af1658bce69d1c5ed9e5e62ee785557cb3\" returns successfully" Feb 9 18:38:41.384000 audit[4806]: AVC avc: denied { watch } for pid=4806 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_37.3049246729/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c420 tclass=file permissive=0 Feb 9 18:38:41.384000 audit[4806]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40002fcf60 a2=fc6 a3=0 items=0 ppid=4673 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c420 key=(null) Feb 9 18:38:41.384000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:38:41.772000 audit[4847]: AVC avc: denied { watch } for pid=4847 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_38.3790498404/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c228,c697 tclass=file permissive=0 Feb 9 18:38:41.772000 audit[4847]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e4bdc0 a2=fc6 a3=0 items=0 ppid=4753 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c697 key=(null) Feb 9 18:38:41.772000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:38:41.928771 kubelet[2484]: E0209 18:38:41.928734 2484 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:47656->10.200.20.31:2379: read: connection timed out" Feb 9 18:38:45.511874 kubelet[2484]: I0209 18:38:45.511837 2484 status_manager.go:809] "Failed to get status for pod" podUID=3086d346c5dd411e57cafcdc248df956 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-9ade464be9" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:47548->10.200.20.31:2379: read: connection timed out" Feb 9 18:38:47.690310 systemd[1]: cri-containerd-56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0.scope: Deactivated successfully. Feb 9 18:38:47.690000 audit: BPF prog-id=203 op=UNLOAD Feb 9 18:38:47.696496 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 18:38:47.696553 kernel: audit: type=1334 audit(1707503927.690:1661): prog-id=203 op=UNLOAD Feb 9 18:38:47.706000 audit: BPF prog-id=206 op=UNLOAD Feb 9 18:38:47.715514 kernel: audit: type=1334 audit(1707503927.706:1662): prog-id=206 op=UNLOAD Feb 9 18:38:47.725594 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0-rootfs.mount: Deactivated successfully. Feb 9 18:38:47.805251 env[1353]: time="2024-02-09T18:38:47.805203573Z" level=info msg="shim disconnected" id=56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0 Feb 9 18:38:47.805251 env[1353]: time="2024-02-09T18:38:47.805251694Z" level=warning msg="cleaning up after shim disconnected" id=56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0 namespace=k8s.io Feb 9 18:38:47.805704 env[1353]: time="2024-02-09T18:38:47.805261775Z" level=info msg="cleaning up dead shim" Feb 9 18:38:47.812764 env[1353]: time="2024-02-09T18:38:47.812723256Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5981 runtime=io.containerd.runc.v2\n" Feb 9 18:38:48.101361 kubelet[2484]: I0209 18:38:48.100639 2484 scope.go:115] "RemoveContainer" containerID="40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341" Feb 9 18:38:48.101361 kubelet[2484]: I0209 18:38:48.100945 2484 scope.go:115] "RemoveContainer" containerID="56547c186f3e2f60004ec3c99656e25ec93b5f54ac4e904dcd8b8add045a5ae0" Feb 9 18:38:48.101361 kubelet[2484]: E0209 18:38:48.101234 2484 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-7ff8dc855-qb45c_tigera-operator(b773fc8c-b899-4517-b130-e56d3956cc35)\"" pod="tigera-operator/tigera-operator-7ff8dc855-qb45c" podUID=b773fc8c-b899-4517-b130-e56d3956cc35 Feb 9 18:38:48.102720 env[1353]: time="2024-02-09T18:38:48.102684573Z" level=info msg="RemoveContainer for \"40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341\"" Feb 9 18:38:48.112251 env[1353]: time="2024-02-09T18:38:48.112211709Z" level=info msg="RemoveContainer for \"40c0db4e302445d28ea6ab6fe6d6ae6003f6005e8a2e8e37018f787025cd2341\" returns successfully" Feb 9 18:38:51.929352 kubelet[2484]: E0209 18:38:51.929316 2484 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-9ade464be9?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:58.757171 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.775860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.793880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.811541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.829769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.847248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.847532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.878743 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.879051 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.879173 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.902625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.902918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.922710 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.922968 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.943502 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.943748 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.963727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.964003 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.983930 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:58.984187 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.004083 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.004329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.023693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.023950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.043235 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.043520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.062984 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.063219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.083334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.083721 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.103993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.104270 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.123213 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.123468 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.142407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.142707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.165736 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.165993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.186800 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.187080 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.205445 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.205665 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.233132 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.233395 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.233532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.260814 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.261058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.261181 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.279586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.279815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.297862 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:59.298105 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001