Feb 9 18:31:26.097904 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:31:26.097922 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:31:26.097930 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 18:31:26.097937 kernel: printk: bootconsole [pl11] enabled Feb 9 18:31:26.097942 kernel: efi: EFI v2.70 by EDK II Feb 9 18:31:26.097947 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 18:31:26.097954 kernel: random: crng init done Feb 9 18:31:26.097959 kernel: ACPI: Early table checksum verification disabled Feb 9 18:31:26.097964 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 18:31:26.097970 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.097975 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.097982 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 18:31:26.097987 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.097993 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098000 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098006 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098012 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098019 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098024 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 18:31:26.098030 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:31:26.098036 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 18:31:26.098041 kernel: NUMA: Failed to initialise from firmware Feb 9 18:31:26.098048 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:31:26.098053 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 18:31:26.098059 kernel: Zone ranges: Feb 9 18:31:26.098065 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 18:31:26.098070 kernel: DMA32 empty Feb 9 18:31:26.098077 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:31:26.098083 kernel: Movable zone start for each node Feb 9 18:31:26.098088 kernel: Early memory node ranges Feb 9 18:31:26.098094 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 18:31:26.098099 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 18:31:26.098105 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 18:31:26.098111 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 18:31:26.098116 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 18:31:26.098122 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 18:31:26.098128 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 18:31:26.098133 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 18:31:26.098139 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:31:26.098146 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:31:26.098155 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 18:31:26.098161 kernel: psci: probing for conduit method from ACPI. Feb 9 18:31:26.098167 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:31:26.098173 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:31:26.098181 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 18:31:26.098187 kernel: psci: SMC Calling Convention v1.4 Feb 9 18:31:26.098193 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 18:31:26.098199 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 18:31:26.101288 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:31:26.101297 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:31:26.101304 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 18:31:26.101310 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:31:26.101317 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:31:26.101323 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:31:26.101329 kernel: CPU features: detected: Spectre-BHB Feb 9 18:31:26.101335 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:31:26.101346 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:31:26.101353 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:31:26.101359 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 18:31:26.101365 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 18:31:26.101372 kernel: Policy zone: Normal Feb 9 18:31:26.101379 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:31:26.101387 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:31:26.101393 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:31:26.101399 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:31:26.101405 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:31:26.101412 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 18:31:26.101419 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 18:31:26.101425 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:31:26.101431 kernel: trace event string verifier disabled Feb 9 18:31:26.101437 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:31:26.101444 kernel: rcu: RCU event tracing is enabled. Feb 9 18:31:26.101450 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:31:26.101456 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:31:26.101463 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:31:26.101469 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:31:26.101475 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:31:26.101483 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:31:26.101489 kernel: GICv3: 960 SPIs implemented Feb 9 18:31:26.101495 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:31:26.101501 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:31:26.101507 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:31:26.101513 kernel: GICv3: 16 PPIs implemented Feb 9 18:31:26.101519 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 18:31:26.101525 kernel: ITS: No ITS available, not enabling LPIs Feb 9 18:31:26.101531 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:31:26.101537 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:31:26.101544 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:31:26.101551 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:31:26.101558 kernel: Console: colour dummy device 80x25 Feb 9 18:31:26.101565 kernel: printk: console [tty1] enabled Feb 9 18:31:26.101571 kernel: ACPI: Core revision 20210730 Feb 9 18:31:26.101578 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:31:26.101584 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:31:26.101590 kernel: LSM: Security Framework initializing Feb 9 18:31:26.101597 kernel: SELinux: Initializing. Feb 9 18:31:26.101603 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:31:26.101610 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:31:26.101617 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 18:31:26.101624 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 18:31:26.101630 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:31:26.101636 kernel: Remapping and enabling EFI services. Feb 9 18:31:26.101643 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:31:26.101649 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:31:26.101656 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 18:31:26.101662 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:31:26.101668 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:31:26.101676 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:31:26.101682 kernel: SMP: Total of 2 processors activated. Feb 9 18:31:26.101688 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:31:26.101695 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 18:31:26.101701 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:31:26.101708 kernel: CPU features: detected: CRC32 instructions Feb 9 18:31:26.101714 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:31:26.101720 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:31:26.101726 kernel: CPU features: detected: Privileged Access Never Feb 9 18:31:26.101734 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:31:26.101740 kernel: alternatives: patching kernel code Feb 9 18:31:26.101751 kernel: devtmpfs: initialized Feb 9 18:31:26.101759 kernel: KASLR enabled Feb 9 18:31:26.101765 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:31:26.101772 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:31:26.101779 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:31:26.101785 kernel: SMBIOS 3.1.0 present. Feb 9 18:31:26.101792 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 18:31:26.101799 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:31:26.101807 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:31:26.101814 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:31:26.101820 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:31:26.101827 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:31:26.101834 kernel: audit: type=2000 audit(0.100:1): state=initialized audit_enabled=0 res=1 Feb 9 18:31:26.101840 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:31:26.101847 kernel: cpuidle: using governor menu Feb 9 18:31:26.101855 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:31:26.101862 kernel: ASID allocator initialised with 32768 entries Feb 9 18:31:26.101868 kernel: ACPI: bus type PCI registered Feb 9 18:31:26.101875 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:31:26.101882 kernel: Serial: AMBA PL011 UART driver Feb 9 18:31:26.101888 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:31:26.101895 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:31:26.101902 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:31:26.101909 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:31:26.101916 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:31:26.101923 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:31:26.101930 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:31:26.101936 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:31:26.101943 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:31:26.101949 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:31:26.101956 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:31:26.101963 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:31:26.101969 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:31:26.101977 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:31:26.101984 kernel: ACPI: Interpreter enabled Feb 9 18:31:26.101990 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:31:26.101997 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:31:26.102004 kernel: printk: console [ttyAMA0] enabled Feb 9 18:31:26.102010 kernel: printk: bootconsole [pl11] disabled Feb 9 18:31:26.102017 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 18:31:26.102024 kernel: iommu: Default domain type: Translated Feb 9 18:31:26.102030 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:31:26.102038 kernel: vgaarb: loaded Feb 9 18:31:26.102045 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:31:26.102052 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:31:26.102059 kernel: PTP clock support registered Feb 9 18:31:26.102065 kernel: Registered efivars operations Feb 9 18:31:26.102072 kernel: No ACPI PMU IRQ for CPU0 Feb 9 18:31:26.102078 kernel: No ACPI PMU IRQ for CPU1 Feb 9 18:31:26.102085 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:31:26.102091 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:31:26.102099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:31:26.102106 kernel: pnp: PnP ACPI init Feb 9 18:31:26.102112 kernel: pnp: PnP ACPI: found 0 devices Feb 9 18:31:26.102119 kernel: NET: Registered PF_INET protocol family Feb 9 18:31:26.102126 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:31:26.102132 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:31:26.102139 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:31:26.102146 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:31:26.102153 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:31:26.102167 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:31:26.102173 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:31:26.102180 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:31:26.102187 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:31:26.102193 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:31:26.102200 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 18:31:26.102217 kernel: kvm [1]: HYP mode not available Feb 9 18:31:26.102224 kernel: Initialise system trusted keyrings Feb 9 18:31:26.102231 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:31:26.102239 kernel: Key type asymmetric registered Feb 9 18:31:26.102245 kernel: Asymmetric key parser 'x509' registered Feb 9 18:31:26.102252 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:31:26.102259 kernel: io scheduler mq-deadline registered Feb 9 18:31:26.102265 kernel: io scheduler kyber registered Feb 9 18:31:26.102272 kernel: io scheduler bfq registered Feb 9 18:31:26.102278 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:31:26.102285 kernel: thunder_xcv, ver 1.0 Feb 9 18:31:26.102291 kernel: thunder_bgx, ver 1.0 Feb 9 18:31:26.102299 kernel: nicpf, ver 1.0 Feb 9 18:31:26.102306 kernel: nicvf, ver 1.0 Feb 9 18:31:26.102443 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:31:26.102506 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:31:25 UTC (1707503485) Feb 9 18:31:26.102515 kernel: efifb: probing for efifb Feb 9 18:31:26.102522 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 18:31:26.102529 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 18:31:26.102536 kernel: efifb: scrolling: redraw Feb 9 18:31:26.102545 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 18:31:26.102552 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:31:26.102558 kernel: fb0: EFI VGA frame buffer device Feb 9 18:31:26.102565 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 18:31:26.102572 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:31:26.102578 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:31:26.102585 kernel: Segment Routing with IPv6 Feb 9 18:31:26.102591 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:31:26.102598 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:31:26.102606 kernel: Key type dns_resolver registered Feb 9 18:31:26.102613 kernel: registered taskstats version 1 Feb 9 18:31:26.102619 kernel: Loading compiled-in X.509 certificates Feb 9 18:31:26.102626 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:31:26.102632 kernel: Key type .fscrypt registered Feb 9 18:31:26.102639 kernel: Key type fscrypt-provisioning registered Feb 9 18:31:26.102645 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:31:26.102652 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:31:26.102659 kernel: ima: No architecture policies found Feb 9 18:31:26.102666 kernel: Freeing unused kernel memory: 34688K Feb 9 18:31:26.102673 kernel: Run /init as init process Feb 9 18:31:26.102680 kernel: with arguments: Feb 9 18:31:26.102686 kernel: /init Feb 9 18:31:26.102693 kernel: with environment: Feb 9 18:31:26.102699 kernel: HOME=/ Feb 9 18:31:26.102705 kernel: TERM=linux Feb 9 18:31:26.102712 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:31:26.102721 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:31:26.102731 systemd[1]: Detected virtualization microsoft. Feb 9 18:31:26.102738 systemd[1]: Detected architecture arm64. Feb 9 18:31:26.102745 systemd[1]: Running in initrd. Feb 9 18:31:26.102752 systemd[1]: No hostname configured, using default hostname. Feb 9 18:31:26.102759 systemd[1]: Hostname set to . Feb 9 18:31:26.102767 systemd[1]: Initializing machine ID from random generator. Feb 9 18:31:26.102774 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:31:26.102782 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:31:26.102789 systemd[1]: Reached target cryptsetup.target. Feb 9 18:31:26.102796 systemd[1]: Reached target paths.target. Feb 9 18:31:26.102803 systemd[1]: Reached target slices.target. Feb 9 18:31:26.102810 systemd[1]: Reached target swap.target. Feb 9 18:31:26.102817 systemd[1]: Reached target timers.target. Feb 9 18:31:26.102824 systemd[1]: Listening on iscsid.socket. Feb 9 18:31:26.102831 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:31:26.102840 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:31:26.102847 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:31:26.102854 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:31:26.102861 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:31:26.102868 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:31:26.102875 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:31:26.102882 systemd[1]: Reached target sockets.target. Feb 9 18:31:26.102889 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:31:26.102898 systemd[1]: Finished network-cleanup.service. Feb 9 18:31:26.102905 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:31:26.102912 systemd[1]: Starting systemd-journald.service... Feb 9 18:31:26.102920 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:31:26.102927 systemd[1]: Starting systemd-resolved.service... Feb 9 18:31:26.102938 systemd-journald[276]: Journal started Feb 9 18:31:26.102980 systemd-journald[276]: Runtime Journal (/run/log/journal/62c35d92f9984fd2bc6c59e4e43310bf) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:31:26.089524 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 18:31:26.130233 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:31:26.130288 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:31:26.139116 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 18:31:26.161747 kernel: Bridge firewalling registered Feb 9 18:31:26.161769 systemd[1]: Started systemd-journald.service. Feb 9 18:31:26.161781 kernel: SCSI subsystem initialized Feb 9 18:31:26.158796 systemd-resolved[278]: Positive Trust Anchors: Feb 9 18:31:26.196544 kernel: audit: type=1130 audit(1707503486.167:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.158805 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:31:26.158833 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:31:26.289908 kernel: audit: type=1130 audit(1707503486.210:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.289933 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:31:26.289951 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:31:26.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.160969 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 18:31:26.326862 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:31:26.326882 kernel: audit: type=1130 audit(1707503486.302:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.168099 systemd[1]: Started systemd-resolved.service. Feb 9 18:31:26.210947 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:31:26.362822 kernel: audit: type=1130 audit(1707503486.331:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.303146 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:31:26.389953 kernel: audit: type=1130 audit(1707503486.357:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.332109 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:31:26.420641 kernel: audit: type=1130 audit(1707503486.383:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.341100 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 18:31:26.357973 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:31:26.384014 systemd[1]: Reached target nss-lookup.target. Feb 9 18:31:26.416279 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:31:26.500031 kernel: audit: type=1130 audit(1707503486.467:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.426497 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:31:26.436833 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:31:26.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.457106 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:31:26.561574 kernel: audit: type=1130 audit(1707503486.511:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.561600 kernel: audit: type=1130 audit(1707503486.540:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.468355 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:31:26.511535 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:31:26.573139 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:31:26.592120 dracut-cmdline[299]: dracut-dracut-053 Feb 9 18:31:26.597305 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:31:26.690258 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:31:26.703242 kernel: iscsi: registered transport (tcp) Feb 9 18:31:26.723020 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:31:26.723077 kernel: QLogic iSCSI HBA Driver Feb 9 18:31:26.760044 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:31:26.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:26.766969 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:31:26.824224 kernel: raid6: neonx8 gen() 13812 MB/s Feb 9 18:31:26.846213 kernel: raid6: neonx8 xor() 10822 MB/s Feb 9 18:31:26.867215 kernel: raid6: neonx4 gen() 13573 MB/s Feb 9 18:31:26.888216 kernel: raid6: neonx4 xor() 10987 MB/s Feb 9 18:31:26.910216 kernel: raid6: neonx2 gen() 12969 MB/s Feb 9 18:31:26.931215 kernel: raid6: neonx2 xor() 10374 MB/s Feb 9 18:31:26.952215 kernel: raid6: neonx1 gen() 10488 MB/s Feb 9 18:31:26.975230 kernel: raid6: neonx1 xor() 8784 MB/s Feb 9 18:31:26.996214 kernel: raid6: int64x8 gen() 6288 MB/s Feb 9 18:31:27.017218 kernel: raid6: int64x8 xor() 3550 MB/s Feb 9 18:31:27.039218 kernel: raid6: int64x4 gen() 7201 MB/s Feb 9 18:31:27.060216 kernel: raid6: int64x4 xor() 3854 MB/s Feb 9 18:31:27.081214 kernel: raid6: int64x2 gen() 6152 MB/s Feb 9 18:31:27.103218 kernel: raid6: int64x2 xor() 3317 MB/s Feb 9 18:31:27.124216 kernel: raid6: int64x1 gen() 5041 MB/s Feb 9 18:31:27.150525 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 18:31:27.150535 kernel: raid6: using algorithm neonx8 gen() 13812 MB/s Feb 9 18:31:27.150544 kernel: raid6: .... xor() 10822 MB/s, rmw enabled Feb 9 18:31:27.155275 kernel: raid6: using neon recovery algorithm Feb 9 18:31:27.174217 kernel: xor: measuring software checksum speed Feb 9 18:31:27.183127 kernel: 8regs : 17286 MB/sec Feb 9 18:31:27.183137 kernel: 32regs : 20749 MB/sec Feb 9 18:31:27.192293 kernel: arm64_neon : 27939 MB/sec Feb 9 18:31:27.192303 kernel: xor: using function: arm64_neon (27939 MB/sec) Feb 9 18:31:27.249221 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:31:27.260334 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:31:27.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:27.269000 audit: BPF prog-id=7 op=LOAD Feb 9 18:31:27.269000 audit: BPF prog-id=8 op=LOAD Feb 9 18:31:27.270013 systemd[1]: Starting systemd-udevd.service... Feb 9 18:31:27.290390 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 18:31:27.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:27.295834 systemd[1]: Started systemd-udevd.service. Feb 9 18:31:27.307339 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:31:27.323404 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 18:31:27.353972 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:31:27.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:27.359756 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:31:27.396685 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:31:27.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:27.453230 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 18:31:27.468237 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 18:31:27.468286 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 18:31:27.478483 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 18:31:27.478533 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 18:31:27.479370 kernel: scsi host1: storvsc_host_t Feb 9 18:31:27.489860 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 9 18:31:27.506570 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 9 18:31:27.506632 kernel: scsi host0: storvsc_host_t Feb 9 18:31:27.506774 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 18:31:27.515631 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 18:31:27.528239 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 18:31:27.550326 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 18:31:27.550515 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:31:27.550525 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 18:31:27.560411 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 18:31:27.560551 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 18:31:27.565198 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 18:31:27.565321 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 18:31:27.574231 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 18:31:27.574378 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:27.583229 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 18:31:27.596220 kernel: hv_netvsc 000d3af5-da93-000d-3af5-da93000d3af5 eth0: VF slot 1 added Feb 9 18:31:27.615183 kernel: hv_vmbus: registering driver hv_pci Feb 9 18:31:27.615242 kernel: hv_pci d6d87474-e164-433a-83b8-8d5cb9ecaad0: PCI VMBus probing: Using version 0x10004 Feb 9 18:31:27.632736 kernel: hv_pci d6d87474-e164-433a-83b8-8d5cb9ecaad0: PCI host bridge to bus e164:00 Feb 9 18:31:27.632991 kernel: pci_bus e164:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 18:31:27.641365 kernel: pci_bus e164:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 18:31:27.650587 kernel: pci e164:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 18:31:27.665068 kernel: pci e164:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:31:27.689316 kernel: pci e164:00:02.0: enabling Extended Tags Feb 9 18:31:27.717892 kernel: pci e164:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at e164:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 18:31:27.718073 kernel: pci_bus e164:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 18:31:27.724430 kernel: pci e164:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:31:27.767230 kernel: mlx5_core e164:00:02.0: firmware version: 16.30.1284 Feb 9 18:31:27.929225 kernel: mlx5_core e164:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 18:31:27.992009 kernel: hv_netvsc 000d3af5-da93-000d-3af5-da93000d3af5 eth0: VF registering: eth1 Feb 9 18:31:27.992181 kernel: mlx5_core e164:00:02.0 eth1: joined to eth0 Feb 9 18:31:28.013225 kernel: mlx5_core e164:00:02.0 enP57700s1: renamed from eth1 Feb 9 18:31:28.021198 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:31:28.089228 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (538) Feb 9 18:31:28.102638 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:31:28.225750 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:31:28.294234 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:31:28.301346 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:31:28.316620 systemd[1]: Starting disk-uuid.service... Feb 9 18:31:28.345234 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:28.353222 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:29.361138 disk-uuid[603]: The operation has completed successfully. Feb 9 18:31:29.367301 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:31:29.423739 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:31:29.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.423839 systemd[1]: Finished disk-uuid.service. Feb 9 18:31:29.429704 systemd[1]: Starting verity-setup.service... Feb 9 18:31:29.479235 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:31:29.720521 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:31:29.726560 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:31:29.737755 systemd[1]: Finished verity-setup.service. Feb 9 18:31:29.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.796232 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:31:29.796931 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:31:29.801316 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:31:29.802104 systemd[1]: Starting ignition-setup.service... Feb 9 18:31:29.823917 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:31:29.846133 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:31:29.846187 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:31:29.851068 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:31:29.923233 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:31:29.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.932000 audit: BPF prog-id=9 op=LOAD Feb 9 18:31:29.933444 systemd[1]: Starting systemd-networkd.service... Feb 9 18:31:29.954054 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:31:29.962079 systemd-networkd[844]: lo: Link UP Feb 9 18:31:29.962094 systemd-networkd[844]: lo: Gained carrier Feb 9 18:31:29.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.962522 systemd-networkd[844]: Enumeration completed Feb 9 18:31:30.016283 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 18:31:30.016308 kernel: audit: type=1130 audit(1707503489.971:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:29.962631 systemd[1]: Started systemd-networkd.service. Feb 9 18:31:29.971069 systemd-networkd[844]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:31:30.060746 kernel: audit: type=1130 audit(1707503490.032:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.001368 systemd[1]: Reached target network.target. Feb 9 18:31:30.065094 iscsid[853]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:31:30.065094 iscsid[853]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 18:31:30.065094 iscsid[853]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:31:30.065094 iscsid[853]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:31:30.065094 iscsid[853]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:31:30.065094 iscsid[853]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:31:30.065094 iscsid[853]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:31:30.195670 kernel: audit: type=1130 audit(1707503490.076:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.195696 kernel: audit: type=1130 audit(1707503490.167:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.195713 kernel: mlx5_core e164:00:02.0 enP57700s1: Link up Feb 9 18:31:30.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.012180 systemd[1]: Starting iscsiuio.service... Feb 9 18:31:30.027891 systemd[1]: Started iscsiuio.service. Feb 9 18:31:30.039268 systemd[1]: Starting iscsid.service... Feb 9 18:31:30.073010 systemd[1]: Started iscsid.service. Feb 9 18:31:30.111783 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:31:30.253723 kernel: hv_netvsc 000d3af5-da93-000d-3af5-da93000d3af5 eth0: Data path switched to VF: enP57700s1 Feb 9 18:31:30.253877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:31:30.163035 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:31:30.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.168258 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:31:30.281249 kernel: audit: type=1130 audit(1707503490.254:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.195695 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:31:30.200653 systemd[1]: Reached target remote-fs.target. Feb 9 18:31:30.210065 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:31:30.239698 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:31:30.249994 systemd-networkd[844]: enP57700s1: Link UP Feb 9 18:31:30.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.250070 systemd-networkd[844]: eth0: Link UP Feb 9 18:31:30.250158 systemd-networkd[844]: eth0: Gained carrier Feb 9 18:31:30.338420 kernel: audit: type=1130 audit(1707503490.306:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:30.276932 systemd-networkd[844]: enP57700s1: Gained carrier Feb 9 18:31:30.291452 systemd-networkd[844]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:31:30.298275 systemd[1]: Finished ignition-setup.service. Feb 9 18:31:30.333281 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:31:31.675369 systemd-networkd[844]: eth0: Gained IPv6LL Feb 9 18:31:33.860366 ignition[868]: Ignition 2.14.0 Feb 9 18:31:33.860380 ignition[868]: Stage: fetch-offline Feb 9 18:31:33.860441 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:33.860466 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:33.969265 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:33.969432 ignition[868]: parsed url from cmdline: "" Feb 9 18:31:33.971610 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:31:33.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:33.969435 ignition[868]: no config URL provided Feb 9 18:31:34.025117 kernel: audit: type=1130 audit(1707503493.983:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.013175 systemd[1]: Starting ignition-fetch.service... Feb 9 18:31:33.969440 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:31:33.969448 ignition[868]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:31:33.969454 ignition[868]: failed to fetch config: resource requires networking Feb 9 18:31:33.969568 ignition[868]: Ignition finished successfully Feb 9 18:31:34.020732 ignition[874]: Ignition 2.14.0 Feb 9 18:31:34.020739 ignition[874]: Stage: fetch Feb 9 18:31:34.020872 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:34.020896 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:34.024858 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:34.025955 ignition[874]: parsed url from cmdline: "" Feb 9 18:31:34.025960 ignition[874]: no config URL provided Feb 9 18:31:34.025967 ignition[874]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:31:34.025985 ignition[874]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:31:34.026030 ignition[874]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 18:31:34.116878 ignition[874]: GET result: OK Feb 9 18:31:34.116983 ignition[874]: config has been read from IMDS userdata Feb 9 18:31:34.117043 ignition[874]: parsing config with SHA512: 08f8f34971a8150b68127a00fedfd8096e394a70e297f8fffdd308fdc0b2b7bccc22283127b6e40714ec51fabd7cd3b911b81241239b2e1ac161c1d3c68373b4 Feb 9 18:31:34.154636 unknown[874]: fetched base config from "system" Feb 9 18:31:34.154655 unknown[874]: fetched base config from "system" Feb 9 18:31:34.155402 ignition[874]: fetch: fetch complete Feb 9 18:31:34.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.154661 unknown[874]: fetched user config from "azure" Feb 9 18:31:34.210133 kernel: audit: type=1130 audit(1707503494.171:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.155408 ignition[874]: fetch: fetch passed Feb 9 18:31:34.166013 systemd[1]: Finished ignition-fetch.service. Feb 9 18:31:34.155457 ignition[874]: Ignition finished successfully Feb 9 18:31:34.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.172903 systemd[1]: Starting ignition-kargs.service... Feb 9 18:31:34.275312 kernel: audit: type=1130 audit(1707503494.238:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.218680 ignition[880]: Ignition 2.14.0 Feb 9 18:31:34.232621 systemd[1]: Finished ignition-kargs.service. Feb 9 18:31:34.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.218686 ignition[880]: Stage: kargs Feb 9 18:31:34.322462 kernel: audit: type=1130 audit(1707503494.286:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.263579 systemd[1]: Starting ignition-disks.service... Feb 9 18:31:34.218796 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:34.279495 systemd[1]: Finished ignition-disks.service. Feb 9 18:31:34.218815 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:34.318545 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:31:34.225381 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:34.337422 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:31:34.229123 ignition[880]: kargs: kargs passed Feb 9 18:31:34.347527 systemd[1]: Reached target local-fs.target. Feb 9 18:31:34.229234 ignition[880]: Ignition finished successfully Feb 9 18:31:34.361732 systemd[1]: Reached target sysinit.target. Feb 9 18:31:34.271035 ignition[886]: Ignition 2.14.0 Feb 9 18:31:34.373447 systemd[1]: Reached target basic.target. Feb 9 18:31:34.271042 ignition[886]: Stage: disks Feb 9 18:31:34.387154 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:31:34.271171 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:34.271194 ignition[886]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:34.274622 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:34.278317 ignition[886]: disks: disks passed Feb 9 18:31:34.278575 ignition[886]: Ignition finished successfully Feb 9 18:31:34.486271 systemd-fsck[894]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 18:31:34.496295 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:31:34.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:34.505125 systemd[1]: Mounting sysroot.mount... Feb 9 18:31:34.537239 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:31:34.537902 systemd[1]: Mounted sysroot.mount. Feb 9 18:31:34.546463 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:31:34.597383 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:31:34.603336 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 18:31:34.612502 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:31:34.612541 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:31:34.629332 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:31:34.701032 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:31:34.706905 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:31:34.732233 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (905) Feb 9 18:31:34.746572 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:31:34.746628 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:31:34.746639 initrd-setup-root[910]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:31:34.762427 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:31:34.767229 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:31:34.791894 initrd-setup-root[936]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:31:34.804035 initrd-setup-root[944]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:31:34.855368 initrd-setup-root[952]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:31:35.295150 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:31:35.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.313234 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:31:35.313291 kernel: audit: type=1130 audit(1707503495.299:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.308788 systemd[1]: Starting ignition-mount.service... Feb 9 18:31:35.330452 systemd[1]: Starting sysroot-boot.service... Feb 9 18:31:35.343349 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:31:35.343527 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:31:35.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.366850 systemd[1]: Finished sysroot-boot.service. Feb 9 18:31:35.401975 kernel: audit: type=1130 audit(1707503495.372:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.402005 ignition[973]: INFO : Ignition 2.14.0 Feb 9 18:31:35.402005 ignition[973]: INFO : Stage: mount Feb 9 18:31:35.402005 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:35.402005 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:35.402005 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:35.471556 kernel: audit: type=1130 audit(1707503495.416:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.471626 ignition[973]: INFO : mount: mount passed Feb 9 18:31:35.471626 ignition[973]: INFO : Ignition finished successfully Feb 9 18:31:35.407830 systemd[1]: Finished ignition-mount.service. Feb 9 18:31:35.879287 coreos-metadata[904]: Feb 09 18:31:35.879 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:31:35.890662 coreos-metadata[904]: Feb 09 18:31:35.890 INFO Fetch successful Feb 9 18:31:35.924119 coreos-metadata[904]: Feb 09 18:31:35.924 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:31:35.939810 coreos-metadata[904]: Feb 09 18:31:35.939 INFO Fetch successful Feb 9 18:31:35.951277 coreos-metadata[904]: Feb 09 18:31:35.950 INFO wrote hostname ci-3510.3.2-a-8e9ed585e1 to /sysroot/etc/hostname Feb 9 18:31:35.961641 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 18:31:35.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:35.969120 systemd[1]: Starting ignition-files.service... Feb 9 18:31:36.005064 kernel: audit: type=1130 audit(1707503495.967:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:31:36.003133 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:31:36.038003 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (983) Feb 9 18:31:36.038060 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:31:36.038070 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:31:36.049237 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:31:36.054089 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:31:36.072789 ignition[1002]: INFO : Ignition 2.14.0 Feb 9 18:31:36.079233 ignition[1002]: INFO : Stage: files Feb 9 18:31:36.079233 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:31:36.079233 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:31:36.106236 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:31:36.113804 ignition[1002]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:31:36.121828 ignition[1002]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:31:36.121828 ignition[1002]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:31:36.195256 ignition[1002]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:31:36.203311 ignition[1002]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:31:36.203311 ignition[1002]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:31:36.203283 unknown[1002]: wrote ssh authorized keys file for user: core Feb 9 18:31:36.224318 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:31:36.224318 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:31:36.650483 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:31:36.799864 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 18:31:36.817392 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:31:36.817392 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:31:36.817392 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 18:31:36.966047 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:31:37.330865 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:31:37.330865 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:31:37.352272 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 18:31:37.693504 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:31:37.947602 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 18:31:37.964964 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:31:37.964964 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:31:37.964964 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Feb 9 18:31:38.116097 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:31:40.912936 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Feb 9 18:31:40.931607 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:31:40.931607 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:31:40.931607 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:31:41.203689 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 18:31:48.474917 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 9 18:31:48.493125 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:31:48.493125 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:31:48.493125 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:31:48.815908 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 18:32:03.676263 ignition[1002]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:32:03.694505 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:32:03.872262 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1004) Feb 9 18:32:03.872293 kernel: audit: type=1130 audit(1707503523.802:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4145906601" Feb 9 18:32:03.872358 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4145906601": device or resource busy Feb 9 18:32:03.872358 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4145906601", trying btrfs: device or resource busy Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4145906601" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4145906601" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem4145906601" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem4145906601" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:32:03.872358 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2499610087" Feb 9 18:32:03.872358 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2499610087": device or resource busy Feb 9 18:32:04.157712 kernel: audit: type=1130 audit(1707503523.876:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.157745 kernel: audit: type=1131 audit(1707503523.876:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.157756 kernel: audit: type=1130 audit(1707503523.927:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.157765 kernel: audit: type=1130 audit(1707503524.034:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.157775 kernel: audit: type=1131 audit(1707503524.061:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.751728 systemd[1]: mnt-oem4145906601.mount: Deactivated successfully. Feb 9 18:32:04.164614 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2499610087", trying btrfs: device or resource busy Feb 9 18:32:04.164614 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2499610087" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2499610087" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2499610087" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2499610087" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:32:04.164614 ignition[1002]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 18:32:04.455266 kernel: audit: type=1130 audit(1707503524.185:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.455306 kernel: audit: type=1131 audit(1707503524.283:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.787792 systemd[1]: Finished ignition-files.service. Feb 9 18:32:04.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(20): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(22): [started] setting preset to enabled for "waagent.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(22): [finished] setting preset to enabled for "waagent.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(23): [started] setting preset to enabled for "nvidia.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: op(23): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:32:04.481519 ignition[1002]: INFO : files: files passed Feb 9 18:32:04.481519 ignition[1002]: INFO : Ignition finished successfully Feb 9 18:32:04.731869 kernel: audit: type=1131 audit(1707503524.459:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.731899 kernel: audit: type=1131 audit(1707503524.496:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.732222 initrd-setup-root-after-ignition[1027]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:32:04.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.830076 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:32:04.755323 iscsid[853]: iscsid shutting down. Feb 9 18:32:03.835580 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:32:03.836440 systemd[1]: Starting ignition-quench.service... Feb 9 18:32:03.862096 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:32:03.862276 systemd[1]: Finished ignition-quench.service. Feb 9 18:32:03.896574 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:32:03.928192 systemd[1]: Reached target ignition-complete.target. Feb 9 18:32:04.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.816819 ignition[1040]: INFO : Ignition 2.14.0 Feb 9 18:32:04.816819 ignition[1040]: INFO : Stage: umount Feb 9 18:32:04.816819 ignition[1040]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:32:04.816819 ignition[1040]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:32:04.816819 ignition[1040]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:32:04.816819 ignition[1040]: INFO : umount: umount passed Feb 9 18:32:04.816819 ignition[1040]: INFO : Ignition finished successfully Feb 9 18:32:04.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:03.974664 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:32:04.019588 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:32:04.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.019704 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:32:04.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.919000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:32:04.061694 systemd[1]: Reached target initrd-fs.target. Feb 9 18:32:04.089661 systemd[1]: Reached target initrd.target. Feb 9 18:32:04.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.106121 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:32:04.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.107097 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:32:04.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.180143 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:32:04.186235 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:32:04.230613 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:32:04.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.237949 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:32:04.253498 systemd[1]: Stopped target timers.target. Feb 9 18:32:04.268150 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:32:05.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.268231 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:32:05.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.283326 systemd[1]: Stopped target initrd.target. Feb 9 18:32:04.312138 systemd[1]: Stopped target basic.target. Feb 9 18:32:05.047927 kernel: hv_netvsc 000d3af5-da93-000d-3af5-da93000d3af5 eth0: Data path switched from VF: enP57700s1 Feb 9 18:32:05.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.322847 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:32:04.334465 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:32:04.345938 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:32:04.359820 systemd[1]: Stopped target remote-fs.target. Feb 9 18:32:05.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.375771 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:32:05.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:05.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.391423 systemd[1]: Stopped target sysinit.target. Feb 9 18:32:04.403128 systemd[1]: Stopped target local-fs.target. Feb 9 18:32:04.414758 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:32:04.432660 systemd[1]: Stopped target swap.target. Feb 9 18:32:04.448041 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:32:04.448112 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:32:04.459468 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:32:04.485678 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:32:04.485735 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:32:04.496679 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:32:04.496719 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:32:04.529466 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:32:04.529513 systemd[1]: Stopped ignition-files.service. Feb 9 18:32:04.547278 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 18:32:04.547321 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 18:32:04.567447 systemd[1]: Stopping ignition-mount.service... Feb 9 18:32:04.589470 systemd[1]: Stopping iscsid.service... Feb 9 18:32:04.595480 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:32:05.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:04.595571 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:32:04.609480 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:32:04.620839 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:32:04.620907 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:32:04.626223 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:32:04.626268 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:32:04.642987 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:32:04.643113 systemd[1]: Stopped iscsid.service. Feb 9 18:32:04.654522 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:32:04.654610 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:32:05.242170 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 18:32:04.667956 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:32:04.668056 systemd[1]: Stopped ignition-mount.service. Feb 9 18:32:04.680804 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:32:04.680857 systemd[1]: Stopped ignition-disks.service. Feb 9 18:32:04.693296 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:32:04.693339 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:32:04.707177 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:32:04.707261 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:32:04.722735 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:32:04.722780 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:32:04.736788 systemd[1]: Stopped target paths.target. Feb 9 18:32:04.749723 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:32:04.759242 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:32:04.774567 systemd[1]: Stopped target slices.target. Feb 9 18:32:04.782670 systemd[1]: Stopped target sockets.target. Feb 9 18:32:04.792444 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:32:04.792508 systemd[1]: Closed iscsid.socket. Feb 9 18:32:04.800410 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:32:04.800458 systemd[1]: Stopped ignition-setup.service. Feb 9 18:32:04.810736 systemd[1]: Stopping iscsiuio.service... Feb 9 18:32:04.821745 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:32:04.822339 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:32:04.822442 systemd[1]: Stopped iscsiuio.service. Feb 9 18:32:04.828734 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:32:04.828824 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:32:04.836934 systemd[1]: Stopped target network.target. Feb 9 18:32:04.847964 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:32:04.847998 systemd[1]: Closed iscsiuio.socket. Feb 9 18:32:04.865586 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:32:04.865637 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:32:04.878004 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:32:04.887030 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:32:04.897920 systemd-networkd[844]: eth0: DHCPv6 lease lost Feb 9 18:32:05.242000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:32:04.899453 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:32:04.899568 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:32:04.910056 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:32:04.910153 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:32:04.920512 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:32:04.920556 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:32:04.930458 systemd[1]: Stopping network-cleanup.service... Feb 9 18:32:04.938388 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:32:04.938457 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:32:04.943689 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:32:04.943738 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:32:04.958596 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:32:04.958647 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:32:04.963708 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:32:04.972905 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:32:04.977593 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:32:04.977757 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:32:04.986271 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:32:04.986306 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:32:04.995449 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:32:04.995488 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:32:05.004786 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:32:05.004843 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:32:05.013281 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:32:05.013327 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:32:05.022771 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:32:05.022809 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:32:05.047390 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:32:05.062303 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:32:05.062392 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:32:05.072891 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:32:05.073010 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:32:05.160580 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:32:05.160737 systemd[1]: Stopped network-cleanup.service. Feb 9 18:32:05.169178 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:32:05.181762 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:32:05.198092 systemd[1]: Switching root. Feb 9 18:32:05.243988 systemd-journald[276]: Journal stopped Feb 9 18:32:17.499831 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:32:17.499851 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:32:17.499862 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:32:17.499872 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:32:17.499879 kernel: SELinux: policy capability open_perms=1 Feb 9 18:32:17.499887 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:32:17.499896 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:32:17.499905 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:32:17.499913 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:32:17.499921 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:32:17.499931 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:32:17.499940 systemd[1]: Successfully loaded SELinux policy in 298.915ms. Feb 9 18:32:17.499950 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.522ms. Feb 9 18:32:17.499960 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:32:17.499972 systemd[1]: Detected virtualization microsoft. Feb 9 18:32:17.499981 systemd[1]: Detected architecture arm64. Feb 9 18:32:17.499990 systemd[1]: Detected first boot. Feb 9 18:32:17.499999 systemd[1]: Hostname set to . Feb 9 18:32:17.500009 systemd[1]: Initializing machine ID from random generator. Feb 9 18:32:17.500018 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:32:17.500026 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 18:32:17.500036 kernel: audit: type=1400 audit(1707503529.818:88): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:32:17.500047 kernel: audit: type=1300 audit(1707503529.818:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:17.500058 kernel: audit: type=1327 audit(1707503529.818:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:17.500067 kernel: audit: type=1400 audit(1707503529.828:89): avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:32:17.500077 kernel: audit: type=1300 audit(1707503529.828:89): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145999 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:17.500086 kernel: audit: type=1307 audit(1707503529.828:89): cwd="/" Feb 9 18:32:17.500096 kernel: audit: type=1302 audit(1707503529.828:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:17.500107 kernel: audit: type=1302 audit(1707503529.828:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:17.500117 kernel: audit: type=1327 audit(1707503529.828:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:17.500126 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:32:17.500135 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:32:17.500145 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:32:17.500155 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:32:17.500165 kernel: audit: type=1334 audit(1707503536.738:90): prog-id=12 op=LOAD Feb 9 18:32:17.500174 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:32:17.500183 kernel: audit: type=1334 audit(1707503536.738:91): prog-id=3 op=UNLOAD Feb 9 18:32:17.500191 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:32:17.500215 kernel: audit: type=1334 audit(1707503536.738:92): prog-id=13 op=LOAD Feb 9 18:32:17.500226 kernel: audit: type=1334 audit(1707503536.738:93): prog-id=14 op=LOAD Feb 9 18:32:17.500236 kernel: audit: type=1334 audit(1707503536.738:94): prog-id=4 op=UNLOAD Feb 9 18:32:17.500247 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:32:17.500256 kernel: audit: type=1334 audit(1707503536.738:95): prog-id=5 op=UNLOAD Feb 9 18:32:17.500265 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:32:17.500274 kernel: audit: type=1334 audit(1707503536.739:96): prog-id=15 op=LOAD Feb 9 18:32:17.500283 kernel: audit: type=1334 audit(1707503536.739:97): prog-id=12 op=UNLOAD Feb 9 18:32:17.500292 kernel: audit: type=1334 audit(1707503536.739:98): prog-id=16 op=LOAD Feb 9 18:32:17.500301 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:32:17.500310 kernel: audit: type=1334 audit(1707503536.739:99): prog-id=17 op=LOAD Feb 9 18:32:17.500323 systemd[1]: Created slice system-getty.slice. Feb 9 18:32:17.500333 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:32:17.500342 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:32:17.500352 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:32:17.500361 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:32:17.500370 systemd[1]: Created slice user.slice. Feb 9 18:32:17.500380 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:32:17.500389 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:32:17.500398 systemd[1]: Set up automount boot.automount. Feb 9 18:32:17.500409 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:32:17.500418 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:32:17.500428 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:32:17.500437 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:32:17.500446 systemd[1]: Reached target integritysetup.target. Feb 9 18:32:17.500455 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:32:17.500465 systemd[1]: Reached target remote-fs.target. Feb 9 18:32:17.500474 systemd[1]: Reached target slices.target. Feb 9 18:32:17.500484 systemd[1]: Reached target swap.target. Feb 9 18:32:17.500494 systemd[1]: Reached target torcx.target. Feb 9 18:32:17.500503 systemd[1]: Reached target veritysetup.target. Feb 9 18:32:17.500512 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:32:17.500523 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:32:17.500532 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:32:17.500543 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:32:17.500552 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:32:17.500562 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:32:17.500571 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:32:17.500581 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:32:17.500590 systemd[1]: Mounting media.mount... Feb 9 18:32:17.500599 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:32:17.500609 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:32:17.500619 systemd[1]: Mounting tmp.mount... Feb 9 18:32:17.500629 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:32:17.500639 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:32:17.500648 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:32:17.500657 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:32:17.500667 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:32:17.500676 systemd[1]: Starting modprobe@drm.service... Feb 9 18:32:17.500686 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:32:17.500695 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:32:17.500706 systemd[1]: Starting modprobe@loop.service... Feb 9 18:32:17.500716 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:32:17.500727 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:32:17.500737 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:32:17.500746 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:32:17.500755 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:32:17.500764 kernel: loop: module loaded Feb 9 18:32:17.500773 systemd[1]: Stopped systemd-journald.service. Feb 9 18:32:17.500784 systemd[1]: systemd-journald.service: Consumed 3.448s CPU time. Feb 9 18:32:17.500793 kernel: fuse: init (API version 7.34) Feb 9 18:32:17.500802 systemd[1]: Starting systemd-journald.service... Feb 9 18:32:17.500812 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:32:17.500821 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:32:17.500831 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:32:17.500840 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:32:17.500849 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:32:17.500859 systemd[1]: Stopped verity-setup.service. Feb 9 18:32:17.500869 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:32:17.500879 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:32:17.500888 systemd[1]: Mounted media.mount. Feb 9 18:32:17.500898 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:32:17.500907 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:32:17.500917 systemd[1]: Mounted tmp.mount. Feb 9 18:32:17.500927 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:32:17.500937 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:32:17.500946 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:32:17.500957 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:32:17.500970 systemd-journald[1177]: Journal started Feb 9 18:32:17.501010 systemd-journald[1177]: Runtime Journal (/run/log/journal/c81550bc11a84fdd93c38c7d16a3287a) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:32:07.674000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:32:08.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:08.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:32:08.481000 audit: BPF prog-id=10 op=LOAD Feb 9 18:32:08.481000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:32:08.481000 audit: BPF prog-id=11 op=LOAD Feb 9 18:32:08.481000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:32:09.818000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:32:09.818000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:09.818000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:09.828000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:32:09.828000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145999 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:09.828000 audit: CWD cwd="/" Feb 9 18:32:09.828000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:09.828000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:09.828000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:32:16.738000 audit: BPF prog-id=12 op=LOAD Feb 9 18:32:16.738000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:32:16.738000 audit: BPF prog-id=13 op=LOAD Feb 9 18:32:16.738000 audit: BPF prog-id=14 op=LOAD Feb 9 18:32:16.738000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:32:16.738000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:32:16.739000 audit: BPF prog-id=15 op=LOAD Feb 9 18:32:16.739000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:32:16.739000 audit: BPF prog-id=16 op=LOAD Feb 9 18:32:16.739000 audit: BPF prog-id=17 op=LOAD Feb 9 18:32:16.739000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:32:16.739000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:32:16.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:16.758000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:32:16.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:16.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.325000 audit: BPF prog-id=18 op=LOAD Feb 9 18:32:17.325000 audit: BPF prog-id=19 op=LOAD Feb 9 18:32:17.325000 audit: BPF prog-id=20 op=LOAD Feb 9 18:32:17.325000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:32:17.325000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:32:17.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.497000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:32:17.497000 audit[1177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=fffff4b19530 a2=4000 a3=1 items=0 ppid=1 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:17.497000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:32:16.737134 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:32:17.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:09.752137 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:32:16.740052 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:32:09.788945 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:32:16.740370 systemd[1]: systemd-journald.service: Consumed 3.448s CPU time. Feb 9 18:32:09.788965 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:32:09.789004 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:32:09.789014 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:32:09.789049 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:32:09.789061 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:32:09.789291 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:32:09.789330 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:32:09.789341 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:32:09.804476 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:32:09.804534 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:32:09.804555 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:32:09.804569 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:32:09.804588 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:32:09.804602 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:32:15.745277 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:15.745546 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:15.745649 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:15.745804 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:32:15.745852 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:32:15.745906 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T18:32:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:32:17.511627 systemd[1]: Started systemd-journald.service. Feb 9 18:32:17.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.512605 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:32:17.512777 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:32:17.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.518187 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:32:17.518327 systemd[1]: Finished modprobe@drm.service. Feb 9 18:32:17.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.523497 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:32:17.523608 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:32:17.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.528555 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:32:17.528674 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:32:17.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.533428 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:32:17.533593 systemd[1]: Finished modprobe@loop.service. Feb 9 18:32:17.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.538563 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:32:17.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.543715 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:32:17.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.549616 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:32:17.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.555087 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:32:17.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.560700 systemd[1]: Reached target network-pre.target. Feb 9 18:32:17.566831 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:32:17.573978 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:32:17.578523 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:32:17.580176 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:32:17.585905 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:32:17.590646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:32:17.591983 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:32:17.596461 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:32:17.598149 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:32:17.603660 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:32:17.608893 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:32:17.615426 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:32:17.620715 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:32:17.630776 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 18:32:17.638168 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:32:17.638566 systemd-journald[1177]: Time spent on flushing to /var/log/journal/c81550bc11a84fdd93c38c7d16a3287a is 14.324ms for 1136 entries. Feb 9 18:32:17.638566 systemd-journald[1177]: System Journal (/var/log/journal/c81550bc11a84fdd93c38c7d16a3287a) is 8.0M, max 2.6G, 2.6G free. Feb 9 18:32:17.714415 systemd-journald[1177]: Received client request to flush runtime journal. Feb 9 18:32:17.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:17.648914 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:32:17.674848 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:32:17.715385 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:32:17.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:18.177550 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:32:18.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:18.536258 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:32:18.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:18.541000 audit: BPF prog-id=21 op=LOAD Feb 9 18:32:18.541000 audit: BPF prog-id=22 op=LOAD Feb 9 18:32:18.542000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:32:18.542000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:32:18.542933 systemd[1]: Starting systemd-udevd.service... Feb 9 18:32:18.560998 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 9 18:32:18.712707 systemd[1]: Started systemd-udevd.service. Feb 9 18:32:18.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:18.724000 audit: BPF prog-id=23 op=LOAD Feb 9 18:32:18.724955 systemd[1]: Starting systemd-networkd.service... Feb 9 18:32:18.755075 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:32:18.810000 audit[1199]: AVC avc: denied { confidentiality } for pid=1199 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:32:18.819385 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:32:18.819522 kernel: hv_vmbus: registering driver hv_balloon Feb 9 18:32:18.829000 audit: BPF prog-id=24 op=LOAD Feb 9 18:32:18.829000 audit: BPF prog-id=25 op=LOAD Feb 9 18:32:18.842519 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 18:32:18.842603 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 18:32:18.829000 audit: BPF prog-id=26 op=LOAD Feb 9 18:32:18.840723 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:32:18.810000 audit[1199]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf40f7b10 a1=aa2c a2=ffffadc624b0 a3=aaaaf4059010 items=12 ppid=1198 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:18.810000 audit: CWD cwd="/" Feb 9 18:32:18.810000 audit: PATH item=0 name=(null) inode=7222 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=1 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=2 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=3 name=(null) inode=10904 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=4 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=5 name=(null) inode=10905 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=6 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=7 name=(null) inode=10906 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=8 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=9 name=(null) inode=10907 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=10 name=(null) inode=10903 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PATH item=11 name=(null) inode=10908 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:32:18.810000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:32:18.856225 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 18:32:18.871119 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 18:32:18.871225 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 18:32:18.878651 kernel: Console: switching to colour dummy device 80x25 Feb 9 18:32:18.889306 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:32:18.909499 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 18:32:18.909663 kernel: hv_vmbus: registering driver hv_utils Feb 9 18:32:18.910231 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 18:32:18.910285 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 18:32:18.910307 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 18:32:19.219614 systemd[1]: Started systemd-userdbd.service. Feb 9 18:32:19.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:19.423421 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1210) Feb 9 18:32:19.439216 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:32:19.451307 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:32:19.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:19.457618 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:32:19.465890 systemd-networkd[1219]: lo: Link UP Feb 9 18:32:19.466154 systemd-networkd[1219]: lo: Gained carrier Feb 9 18:32:19.466652 systemd-networkd[1219]: Enumeration completed Feb 9 18:32:19.466865 systemd[1]: Started systemd-networkd.service. Feb 9 18:32:19.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:19.473709 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:32:19.493382 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:32:19.542235 kernel: mlx5_core e164:00:02.0 enP57700s1: Link up Feb 9 18:32:19.570256 kernel: hv_netvsc 000d3af5-da93-000d-3af5-da93000d3af5 eth0: Data path switched to VF: enP57700s1 Feb 9 18:32:19.571538 systemd-networkd[1219]: enP57700s1: Link UP Feb 9 18:32:19.571917 systemd-networkd[1219]: eth0: Link UP Feb 9 18:32:19.571936 systemd-networkd[1219]: eth0: Gained carrier Feb 9 18:32:19.576677 systemd-networkd[1219]: enP57700s1: Gained carrier Feb 9 18:32:19.587327 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:32:19.700909 lvm[1275]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:32:19.740131 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:32:19.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:19.745950 systemd[1]: Reached target cryptsetup.target. Feb 9 18:32:19.752320 systemd[1]: Starting lvm2-activation.service... Feb 9 18:32:19.756559 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:32:19.783194 systemd[1]: Finished lvm2-activation.service. Feb 9 18:32:19.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:19.788414 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:32:19.793730 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:32:19.793760 systemd[1]: Reached target local-fs.target. Feb 9 18:32:19.798838 systemd[1]: Reached target machines.target. Feb 9 18:32:19.805103 systemd[1]: Starting ldconfig.service... Feb 9 18:32:19.809736 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:32:19.809800 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:19.811019 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:32:19.817675 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:32:19.826003 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:32:19.832046 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:32:19.832108 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:32:19.833361 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:32:19.886533 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1280 (bootctl) Feb 9 18:32:19.889356 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:32:20.040519 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:32:20.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:20.462151 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:32:20.462762 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:32:20.468879 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:32:20.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:20.556196 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) Feb 9 18:32:20.556196 systemd-fsck[1288]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 18:32:20.558884 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:32:20.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:20.570371 systemd[1]: Mounting boot.mount... Feb 9 18:32:20.581838 systemd[1]: Mounted boot.mount. Feb 9 18:32:20.592605 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:32:20.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:20.598587 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:32:20.674985 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:32:21.132371 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 18:32:21.138148 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:32:21.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.300398 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:32:21.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.306654 systemd[1]: Starting audit-rules.service... Feb 9 18:32:21.311908 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:32:21.317557 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:32:21.322000 audit: BPF prog-id=27 op=LOAD Feb 9 18:32:21.324104 systemd[1]: Starting systemd-resolved.service... Feb 9 18:32:21.327000 audit: BPF prog-id=28 op=LOAD Feb 9 18:32:21.329918 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:32:21.335874 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:32:21.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.366667 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:32:21.371632 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:32:21.380000 audit[1300]: SYSTEM_BOOT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.383641 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:32:21.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.423496 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:32:21.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.428323 systemd[1]: Reached target time-set.target. Feb 9 18:32:21.442138 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:32:21.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.479780 systemd-resolved[1297]: Positive Trust Anchors: Feb 9 18:32:21.480088 systemd-resolved[1297]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:32:21.480172 systemd-resolved[1297]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:32:21.526392 systemd-resolved[1297]: Using system hostname 'ci-3510.3.2-a-8e9ed585e1'. Feb 9 18:32:21.528196 systemd[1]: Started systemd-resolved.service. Feb 9 18:32:21.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:32:21.533122 systemd[1]: Reached target network.target. Feb 9 18:32:21.537512 systemd[1]: Reached target network-online.target. Feb 9 18:32:21.542983 systemd[1]: Reached target nss-lookup.target. Feb 9 18:32:21.697000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:32:21.697000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb50c1a0 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:32:21.697000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:32:21.698836 augenrules[1315]: No rules Feb 9 18:32:21.699682 systemd[1]: Finished audit-rules.service. Feb 9 18:32:21.847173 systemd-timesyncd[1298]: Contacted time server 23.141.40.123:123 (0.flatcar.pool.ntp.org). Feb 9 18:32:21.847248 systemd-timesyncd[1298]: Initial clock synchronization to Fri 2024-02-09 18:32:21.893174 UTC. Feb 9 18:32:28.412713 ldconfig[1279]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:32:28.423715 systemd[1]: Finished ldconfig.service. Feb 9 18:32:28.430141 systemd[1]: Starting systemd-update-done.service... Feb 9 18:32:28.474291 systemd[1]: Finished systemd-update-done.service. Feb 9 18:32:28.479496 systemd[1]: Reached target sysinit.target. Feb 9 18:32:28.483986 systemd[1]: Started motdgen.path. Feb 9 18:32:28.487890 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:32:28.495379 systemd[1]: Started logrotate.timer. Feb 9 18:32:28.500120 systemd[1]: Started mdadm.timer. Feb 9 18:32:28.503884 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:32:28.508641 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:32:28.508689 systemd[1]: Reached target paths.target. Feb 9 18:32:28.512829 systemd[1]: Reached target timers.target. Feb 9 18:32:28.517781 systemd[1]: Listening on dbus.socket. Feb 9 18:32:28.522822 systemd[1]: Starting docker.socket... Feb 9 18:32:28.546393 systemd[1]: Listening on sshd.socket. Feb 9 18:32:28.551097 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:28.551600 systemd[1]: Listening on docker.socket. Feb 9 18:32:28.556184 systemd[1]: Reached target sockets.target. Feb 9 18:32:28.560980 systemd[1]: Reached target basic.target. Feb 9 18:32:28.565566 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:32:28.565596 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:32:28.566796 systemd[1]: Starting containerd.service... Feb 9 18:32:28.571772 systemd[1]: Starting dbus.service... Feb 9 18:32:28.576301 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:32:28.582031 systemd[1]: Starting extend-filesystems.service... Feb 9 18:32:28.589347 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:32:28.590471 systemd[1]: Starting motdgen.service... Feb 9 18:32:28.595720 systemd[1]: Started nvidia.service. Feb 9 18:32:28.601382 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:32:28.607615 systemd[1]: Starting prepare-critools.service... Feb 9 18:32:28.613284 systemd[1]: Starting prepare-helm.service... Feb 9 18:32:28.618658 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:32:28.624074 systemd[1]: Starting sshd-keygen.service... Feb 9 18:32:28.629796 systemd[1]: Starting systemd-logind.service... Feb 9 18:32:28.636130 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:32:28.636188 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:32:28.636676 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:32:28.637587 systemd[1]: Starting update-engine.service... Feb 9 18:32:28.643490 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:32:28.654509 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:32:28.654687 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:32:28.685446 extend-filesystems[1326]: Found sda Feb 9 18:32:28.685446 extend-filesystems[1326]: Found sda1 Feb 9 18:32:28.685446 extend-filesystems[1326]: Found sda2 Feb 9 18:32:28.698836 extend-filesystems[1326]: Found sda3 Feb 9 18:32:28.698836 extend-filesystems[1326]: Found usr Feb 9 18:32:28.698836 extend-filesystems[1326]: Found sda4 Feb 9 18:32:28.698836 extend-filesystems[1326]: Found sda6 Feb 9 18:32:28.698836 extend-filesystems[1326]: Found sda7 Feb 9 18:32:28.698836 extend-filesystems[1326]: Found sda9 Feb 9 18:32:28.698836 extend-filesystems[1326]: Checking size of /dev/sda9 Feb 9 18:32:28.717659 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:32:28.717843 systemd[1]: Finished motdgen.service. Feb 9 18:32:28.751731 systemd-logind[1340]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 9 18:32:28.751976 systemd-logind[1340]: New seat seat0. Feb 9 18:32:28.758905 jq[1345]: true Feb 9 18:32:28.760236 jq[1325]: false Feb 9 18:32:28.774508 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:32:28.774676 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:32:28.785037 tar[1347]: ./ Feb 9 18:32:28.785037 tar[1347]: ./loopback Feb 9 18:32:28.787611 tar[1349]: linux-arm64/helm Feb 9 18:32:28.788149 tar[1348]: crictl Feb 9 18:32:28.809558 extend-filesystems[1326]: Old size kept for /dev/sda9 Feb 9 18:32:28.809558 extend-filesystems[1326]: Found sr0 Feb 9 18:32:28.842766 env[1356]: time="2024-02-09T18:32:28.815646119Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:32:28.842975 jq[1379]: true Feb 9 18:32:28.814932 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:32:28.815120 systemd[1]: Finished extend-filesystems.service. Feb 9 18:32:28.877738 tar[1347]: ./bandwidth Feb 9 18:32:28.896159 dbus-daemon[1324]: [system] SELinux support is enabled Feb 9 18:32:28.896453 systemd[1]: Started dbus.service. Feb 9 18:32:28.902135 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:32:28.902159 systemd[1]: Reached target system-config.target. Feb 9 18:32:28.909644 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:32:28.909663 systemd[1]: Reached target user-config.target. Feb 9 18:32:28.917293 systemd[1]: Started systemd-logind.service. Feb 9 18:32:28.935036 env[1356]: time="2024-02-09T18:32:28.934993049Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:32:28.940478 env[1356]: time="2024-02-09T18:32:28.940407660Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.941867 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:32:28.944266 env[1356]: time="2024-02-09T18:32:28.944230123Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:28.944423 env[1356]: time="2024-02-09T18:32:28.944402099Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.944775 env[1356]: time="2024-02-09T18:32:28.944752864Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:28.944933 env[1356]: time="2024-02-09T18:32:28.944915141Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.945351 env[1356]: time="2024-02-09T18:32:28.945329429Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:32:28.945440 env[1356]: time="2024-02-09T18:32:28.945424976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.952430 env[1356]: time="2024-02-09T18:32:28.952404723Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.952866 env[1356]: time="2024-02-09T18:32:28.952842858Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:32:28.954573 env[1356]: time="2024-02-09T18:32:28.954479654Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:32:28.954669 env[1356]: time="2024-02-09T18:32:28.954653714Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:32:28.956259 env[1356]: time="2024-02-09T18:32:28.956234520Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:32:28.956415 env[1356]: time="2024-02-09T18:32:28.956398240Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980794310Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980846131Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980859477Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980897111Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980913864Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980928091Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.980942199Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981325347Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981344384Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981358492Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981371357Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981383781Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981500208Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:32:28.982807 env[1356]: time="2024-02-09T18:32:28.981572710Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981818590Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981843919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981856865Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981932933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981948884Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981973412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981985356Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.981997339Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982011567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982023951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982037337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982051805Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982166389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982185466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.983563 env[1356]: time="2024-02-09T18:32:28.982217890Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.994578 env[1356]: time="2024-02-09T18:32:28.982231837Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:32:28.994578 env[1356]: time="2024-02-09T18:32:28.982247347Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:32:28.994578 env[1356]: time="2024-02-09T18:32:28.982259451Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:32:28.994578 env[1356]: time="2024-02-09T18:32:28.982275963Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:32:28.994578 env[1356]: time="2024-02-09T18:32:28.982310671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:32:28.994696 env[1356]: time="2024-02-09T18:32:28.982509058Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:32:28.994696 env[1356]: time="2024-02-09T18:32:28.982559557Z" level=info msg="Connect containerd service" Feb 9 18:32:28.994696 env[1356]: time="2024-02-09T18:32:28.982589655Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995066936Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995235906Z" level=info msg="Start subscribing containerd event" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995290773Z" level=info msg="Start recovering state" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995384275Z" level=info msg="Start event monitor" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995401268Z" level=info msg="Start snapshots syncer" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995411969Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995413733Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995419584Z" level=info msg="Start streaming server" Feb 9 18:32:29.010100 env[1356]: time="2024-02-09T18:32:28.995457618Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:32:29.010316 bash[1401]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:32:28.995605 systemd[1]: Started containerd.service. Feb 9 18:32:29.004008 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:32:29.014617 tar[1347]: ./ptp Feb 9 18:32:29.016255 env[1356]: time="2024-02-09T18:32:29.016214596Z" level=info msg="containerd successfully booted in 0.211649s" Feb 9 18:32:29.089950 tar[1347]: ./vlan Feb 9 18:32:29.154067 tar[1347]: ./host-device Feb 9 18:32:29.213978 tar[1347]: ./tuning Feb 9 18:32:29.267215 tar[1347]: ./vrf Feb 9 18:32:29.321370 tar[1347]: ./sbr Feb 9 18:32:29.378184 tar[1347]: ./tap Feb 9 18:32:29.399391 update_engine[1344]: I0209 18:32:29.387001 1344 main.cc:92] Flatcar Update Engine starting Feb 9 18:32:29.437967 tar[1347]: ./dhcp Feb 9 18:32:29.447681 systemd[1]: Started update-engine.service. Feb 9 18:32:29.461116 update_engine[1344]: I0209 18:32:29.447723 1344 update_check_scheduler.cc:74] Next update check in 9m22s Feb 9 18:32:29.456089 systemd[1]: Started locksmithd.service. Feb 9 18:32:29.606182 tar[1347]: ./static Feb 9 18:32:29.651031 tar[1347]: ./firewall Feb 9 18:32:29.660993 systemd[1]: Finished prepare-critools.service. Feb 9 18:32:29.695176 tar[1347]: ./macvlan Feb 9 18:32:29.724615 tar[1347]: ./dummy Feb 9 18:32:29.753560 tar[1347]: ./bridge Feb 9 18:32:29.786048 tar[1347]: ./ipvlan Feb 9 18:32:29.795081 tar[1349]: linux-arm64/LICENSE Feb 9 18:32:29.795399 tar[1349]: linux-arm64/README.md Feb 9 18:32:29.800330 systemd[1]: Finished prepare-helm.service. Feb 9 18:32:29.830883 tar[1347]: ./portmap Feb 9 18:32:29.858541 tar[1347]: ./host-local Feb 9 18:32:29.940856 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:32:30.408091 sshd_keygen[1343]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:32:30.426714 systemd[1]: Finished sshd-keygen.service. Feb 9 18:32:30.432592 systemd[1]: Starting issuegen.service... Feb 9 18:32:30.437611 systemd[1]: Started waagent.service. Feb 9 18:32:30.442338 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:32:30.442506 systemd[1]: Finished issuegen.service. Feb 9 18:32:30.448085 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:32:30.492554 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:32:30.499566 systemd[1]: Started getty@tty1.service. Feb 9 18:32:30.505588 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:32:30.510445 systemd[1]: Reached target getty.target. Feb 9 18:32:30.520269 systemd[1]: Reached target multi-user.target. Feb 9 18:32:30.527379 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:32:30.535311 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:32:30.535480 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:32:30.544168 systemd[1]: Startup finished in 801ms (kernel) + 41.535s (initrd) + 23.042s (userspace) = 1min 5.378s. Feb 9 18:32:31.140153 login[1455]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 18:32:31.152754 login[1454]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:32:31.179158 systemd[1]: Created slice user-500.slice. Feb 9 18:32:31.180304 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:32:31.183027 systemd-logind[1340]: New session 2 of user core. Feb 9 18:32:31.216342 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:32:31.218129 systemd[1]: Starting user@500.service... Feb 9 18:32:31.234157 (systemd)[1458]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:32:31.303744 locksmithd[1432]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:32:31.501519 systemd[1458]: Queued start job for default target default.target. Feb 9 18:32:31.502754 systemd[1458]: Reached target paths.target. Feb 9 18:32:31.502881 systemd[1458]: Reached target sockets.target. Feb 9 18:32:31.502951 systemd[1458]: Reached target timers.target. Feb 9 18:32:31.503012 systemd[1458]: Reached target basic.target. Feb 9 18:32:31.503173 systemd[1]: Started user@500.service. Feb 9 18:32:31.504009 systemd[1]: Started session-2.scope. Feb 9 18:32:31.509278 systemd[1458]: Reached target default.target. Feb 9 18:32:31.509330 systemd[1458]: Startup finished in 268ms. Feb 9 18:32:32.141611 login[1455]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:32:32.145339 systemd-logind[1340]: New session 1 of user core. Feb 9 18:32:32.146182 systemd[1]: Started session-1.scope. Feb 9 18:32:40.338181 waagent[1452]: 2024-02-09T18:32:40.338073Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 18:32:40.345173 waagent[1452]: 2024-02-09T18:32:40.345077Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 18:32:40.350122 waagent[1452]: 2024-02-09T18:32:40.350036Z INFO Daemon Daemon Python: 3.9.16 Feb 9 18:32:40.354948 waagent[1452]: 2024-02-09T18:32:40.354833Z INFO Daemon Daemon Run daemon Feb 9 18:32:40.359591 waagent[1452]: 2024-02-09T18:32:40.359515Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 18:32:40.376557 waagent[1452]: 2024-02-09T18:32:40.376407Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:32:40.392013 waagent[1452]: 2024-02-09T18:32:40.391875Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:32:40.402294 waagent[1452]: 2024-02-09T18:32:40.402193Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:32:40.407729 waagent[1452]: 2024-02-09T18:32:40.407637Z INFO Daemon Daemon Using waagent for provisioning Feb 9 18:32:40.413825 waagent[1452]: 2024-02-09T18:32:40.413749Z INFO Daemon Daemon Activate resource disk Feb 9 18:32:40.418662 waagent[1452]: 2024-02-09T18:32:40.418593Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 18:32:40.433605 waagent[1452]: 2024-02-09T18:32:40.433530Z INFO Daemon Daemon Found device: None Feb 9 18:32:40.438417 waagent[1452]: 2024-02-09T18:32:40.438353Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 18:32:40.447196 waagent[1452]: 2024-02-09T18:32:40.447130Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 18:32:40.459284 waagent[1452]: 2024-02-09T18:32:40.459221Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:32:40.465446 waagent[1452]: 2024-02-09T18:32:40.465386Z INFO Daemon Daemon Running default provisioning handler Feb 9 18:32:40.478824 waagent[1452]: 2024-02-09T18:32:40.478702Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:32:40.493529 waagent[1452]: 2024-02-09T18:32:40.493406Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:32:40.502981 waagent[1452]: 2024-02-09T18:32:40.502908Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:32:40.508238 waagent[1452]: 2024-02-09T18:32:40.508150Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 18:32:40.591266 waagent[1452]: 2024-02-09T18:32:40.591052Z INFO Daemon Daemon Successfully mounted dvd Feb 9 18:32:40.706833 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 18:32:40.728594 waagent[1452]: 2024-02-09T18:32:40.728418Z INFO Daemon Daemon Detect protocol endpoint Feb 9 18:32:40.733884 waagent[1452]: 2024-02-09T18:32:40.733802Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:32:40.740096 waagent[1452]: 2024-02-09T18:32:40.740020Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 18:32:40.746714 waagent[1452]: 2024-02-09T18:32:40.746645Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 18:32:40.752103 waagent[1452]: 2024-02-09T18:32:40.752039Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 18:32:40.757119 waagent[1452]: 2024-02-09T18:32:40.757056Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 18:32:40.860117 waagent[1452]: 2024-02-09T18:32:40.859978Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 18:32:40.867377 waagent[1452]: 2024-02-09T18:32:40.867330Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 18:32:40.873065 waagent[1452]: 2024-02-09T18:32:40.872984Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 18:32:41.273941 waagent[1452]: 2024-02-09T18:32:41.273752Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 18:32:41.289482 waagent[1452]: 2024-02-09T18:32:41.289410Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 18:32:41.295828 waagent[1452]: 2024-02-09T18:32:41.295761Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 18:32:41.370968 waagent[1452]: 2024-02-09T18:32:41.370835Z INFO Daemon Daemon Found private key matching thumbprint 70F748330842F76F286700F4F9EB7AF953E3D2C6 Feb 9 18:32:41.380432 waagent[1452]: 2024-02-09T18:32:41.380339Z INFO Daemon Daemon Certificate with thumbprint 997D6ECEA3687ADA4C7BBC0CA251CD5E4AC265EB has no matching private key. Feb 9 18:32:41.390085 waagent[1452]: 2024-02-09T18:32:41.390001Z INFO Daemon Daemon Fetch goal state completed Feb 9 18:32:41.417665 waagent[1452]: 2024-02-09T18:32:41.417606Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2606eef4-eb37-4736-b845-410d23c435e4 New eTag: 4005279994621708603] Feb 9 18:32:41.429052 waagent[1452]: 2024-02-09T18:32:41.428973Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:32:41.445124 waagent[1452]: 2024-02-09T18:32:41.445048Z INFO Daemon Daemon Starting provisioning Feb 9 18:32:41.450428 waagent[1452]: 2024-02-09T18:32:41.450360Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 18:32:41.455468 waagent[1452]: 2024-02-09T18:32:41.455404Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-8e9ed585e1] Feb 9 18:32:41.549090 waagent[1452]: 2024-02-09T18:32:41.548955Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-8e9ed585e1] Feb 9 18:32:41.555562 waagent[1452]: 2024-02-09T18:32:41.555480Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 18:32:41.561893 waagent[1452]: 2024-02-09T18:32:41.561831Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 18:32:41.577727 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 18:32:41.577881 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 18:32:41.577936 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 18:32:41.578149 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:32:41.585250 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 18:32:41.586472 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:32:41.586646 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:32:41.588567 systemd[1]: Starting systemd-networkd.service... Feb 9 18:32:41.615671 systemd-networkd[1504]: enP57700s1: Link UP Feb 9 18:32:41.615683 systemd-networkd[1504]: enP57700s1: Gained carrier Feb 9 18:32:41.616618 systemd-networkd[1504]: eth0: Link UP Feb 9 18:32:41.616628 systemd-networkd[1504]: eth0: Gained carrier Feb 9 18:32:41.616950 systemd-networkd[1504]: lo: Link UP Feb 9 18:32:41.616959 systemd-networkd[1504]: lo: Gained carrier Feb 9 18:32:41.617190 systemd-networkd[1504]: eth0: Gained IPv6LL Feb 9 18:32:41.617541 systemd-networkd[1504]: Enumeration completed Feb 9 18:32:41.617643 systemd[1]: Started systemd-networkd.service. Feb 9 18:32:41.618116 systemd-networkd[1504]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:32:41.619469 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:32:41.623895 waagent[1452]: 2024-02-09T18:32:41.623318Z INFO Daemon Daemon Create user account if not exists Feb 9 18:32:41.630732 waagent[1452]: 2024-02-09T18:32:41.630646Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 18:32:41.636917 waagent[1452]: 2024-02-09T18:32:41.636830Z INFO Daemon Daemon Configure sudoer Feb 9 18:32:41.642108 waagent[1452]: 2024-02-09T18:32:41.642036Z INFO Daemon Daemon Configure sshd Feb 9 18:32:41.646117 systemd-networkd[1504]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:32:41.647554 waagent[1452]: 2024-02-09T18:32:41.647482Z INFO Daemon Daemon Deploy ssh public key. Feb 9 18:32:41.652534 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:32:42.864268 waagent[1452]: 2024-02-09T18:32:42.864158Z INFO Daemon Daemon Provisioning complete Feb 9 18:32:42.887156 waagent[1452]: 2024-02-09T18:32:42.887086Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 18:32:42.893237 waagent[1452]: 2024-02-09T18:32:42.893148Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 18:32:42.904057 waagent[1452]: 2024-02-09T18:32:42.903976Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 18:32:43.212915 waagent[1514]: 2024-02-09T18:32:43.212757Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 18:32:43.214081 waagent[1514]: 2024-02-09T18:32:43.214016Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:43.214374 waagent[1514]: 2024-02-09T18:32:43.214318Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:43.228647 waagent[1514]: 2024-02-09T18:32:43.228562Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 18:32:43.228997 waagent[1514]: 2024-02-09T18:32:43.228942Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 18:32:43.300616 waagent[1514]: 2024-02-09T18:32:43.300466Z INFO ExtHandler ExtHandler Found private key matching thumbprint 70F748330842F76F286700F4F9EB7AF953E3D2C6 Feb 9 18:32:43.301023 waagent[1514]: 2024-02-09T18:32:43.300962Z INFO ExtHandler ExtHandler Certificate with thumbprint 997D6ECEA3687ADA4C7BBC0CA251CD5E4AC265EB has no matching private key. Feb 9 18:32:43.301458 waagent[1514]: 2024-02-09T18:32:43.301393Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 18:32:43.319056 waagent[1514]: 2024-02-09T18:32:43.318987Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: c50ca6d3-e6f3-4f8b-bb53-c7d2a37f8855 New eTag: 4005279994621708603] Feb 9 18:32:43.319999 waagent[1514]: 2024-02-09T18:32:43.319922Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:32:43.403942 waagent[1514]: 2024-02-09T18:32:43.403781Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:32:43.429193 waagent[1514]: 2024-02-09T18:32:43.429093Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1514 Feb 9 18:32:43.433310 waagent[1514]: 2024-02-09T18:32:43.433221Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:32:43.434862 waagent[1514]: 2024-02-09T18:32:43.434795Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:32:43.570879 waagent[1514]: 2024-02-09T18:32:43.570821Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:32:43.571519 waagent[1514]: 2024-02-09T18:32:43.571457Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:32:43.580007 waagent[1514]: 2024-02-09T18:32:43.579955Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:32:43.580649 waagent[1514]: 2024-02-09T18:32:43.580588Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:32:43.581945 waagent[1514]: 2024-02-09T18:32:43.581874Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 18:32:43.583521 waagent[1514]: 2024-02-09T18:32:43.583449Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:32:43.583778 waagent[1514]: 2024-02-09T18:32:43.583701Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:43.584179 waagent[1514]: 2024-02-09T18:32:43.584117Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:43.585048 waagent[1514]: 2024-02-09T18:32:43.584978Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:32:43.585393 waagent[1514]: 2024-02-09T18:32:43.585332Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:32:43.585393 waagent[1514]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:32:43.585393 waagent[1514]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:32:43.585393 waagent[1514]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:32:43.585393 waagent[1514]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:43.585393 waagent[1514]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:43.585393 waagent[1514]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:43.587498 waagent[1514]: 2024-02-09T18:32:43.587320Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:32:43.587817 waagent[1514]: 2024-02-09T18:32:43.587740Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:43.588634 waagent[1514]: 2024-02-09T18:32:43.588562Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:43.589224 waagent[1514]: 2024-02-09T18:32:43.589138Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:32:43.589411 waagent[1514]: 2024-02-09T18:32:43.589357Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:32:43.589529 waagent[1514]: 2024-02-09T18:32:43.589486Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:32:43.590417 waagent[1514]: 2024-02-09T18:32:43.590353Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:32:43.590591 waagent[1514]: 2024-02-09T18:32:43.590509Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:32:43.591355 waagent[1514]: 2024-02-09T18:32:43.591273Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:32:43.591564 waagent[1514]: 2024-02-09T18:32:43.591482Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:32:43.591839 waagent[1514]: 2024-02-09T18:32:43.591777Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:32:43.602773 waagent[1514]: 2024-02-09T18:32:43.602703Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 18:32:43.604308 waagent[1514]: 2024-02-09T18:32:43.604257Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:32:43.605358 waagent[1514]: 2024-02-09T18:32:43.605298Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 18:32:43.628961 waagent[1514]: 2024-02-09T18:32:43.628869Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1504' Feb 9 18:32:43.631281 waagent[1514]: 2024-02-09T18:32:43.631197Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 18:32:43.729150 waagent[1514]: 2024-02-09T18:32:43.729008Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:32:43.729150 waagent[1514]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:32:43.729150 waagent[1514]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:32:43.729150 waagent[1514]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f5:da:93 brd ff:ff:ff:ff:ff:ff Feb 9 18:32:43.729150 waagent[1514]: 3: enP57700s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f5:da:93 brd ff:ff:ff:ff:ff:ff\ altname enP57700p0s2 Feb 9 18:32:43.729150 waagent[1514]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:32:43.729150 waagent[1514]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:32:43.729150 waagent[1514]: 2: eth0 inet 10.200.20.36/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:32:43.729150 waagent[1514]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:32:43.729150 waagent[1514]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:32:43.729150 waagent[1514]: 2: eth0 inet6 fe80::20d:3aff:fef5:da93/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:32:43.794156 waagent[1514]: 2024-02-09T18:32:43.794081Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 18:32:43.907851 waagent[1452]: 2024-02-09T18:32:43.907653Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 18:32:43.911630 waagent[1452]: 2024-02-09T18:32:43.911570Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 18:32:45.048944 waagent[1542]: 2024-02-09T18:32:45.048841Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 18:32:45.049660 waagent[1542]: 2024-02-09T18:32:45.049596Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 18:32:45.049790 waagent[1542]: 2024-02-09T18:32:45.049743Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 18:32:45.058006 waagent[1542]: 2024-02-09T18:32:45.057887Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:32:45.058440 waagent[1542]: 2024-02-09T18:32:45.058382Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:45.058594 waagent[1542]: 2024-02-09T18:32:45.058547Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:45.071472 waagent[1542]: 2024-02-09T18:32:45.071395Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 18:32:45.080281 waagent[1542]: 2024-02-09T18:32:45.080193Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 18:32:45.081327 waagent[1542]: 2024-02-09T18:32:45.081266Z INFO ExtHandler Feb 9 18:32:45.081475 waagent[1542]: 2024-02-09T18:32:45.081429Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4f4eb2a3-22fb-4b67-a0ba-f8a246dd12f5 eTag: 4005279994621708603 source: Fabric] Feb 9 18:32:45.082197 waagent[1542]: 2024-02-09T18:32:45.082138Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 18:32:45.083457 waagent[1542]: 2024-02-09T18:32:45.083394Z INFO ExtHandler Feb 9 18:32:45.083590 waagent[1542]: 2024-02-09T18:32:45.083544Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 18:32:45.092586 waagent[1542]: 2024-02-09T18:32:45.092528Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 18:32:45.093139 waagent[1542]: 2024-02-09T18:32:45.093085Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:32:45.116934 waagent[1542]: 2024-02-09T18:32:45.116865Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 18:32:45.189545 waagent[1542]: 2024-02-09T18:32:45.189391Z INFO ExtHandler Downloaded certificate {'thumbprint': '997D6ECEA3687ADA4C7BBC0CA251CD5E4AC265EB', 'hasPrivateKey': False} Feb 9 18:32:45.190650 waagent[1542]: 2024-02-09T18:32:45.190587Z INFO ExtHandler Downloaded certificate {'thumbprint': '70F748330842F76F286700F4F9EB7AF953E3D2C6', 'hasPrivateKey': True} Feb 9 18:32:45.191725 waagent[1542]: 2024-02-09T18:32:45.191663Z INFO ExtHandler Fetch goal state completed Feb 9 18:32:45.218587 waagent[1542]: 2024-02-09T18:32:45.218512Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1542 Feb 9 18:32:45.222145 waagent[1542]: 2024-02-09T18:32:45.222076Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:32:45.223662 waagent[1542]: 2024-02-09T18:32:45.223602Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:32:45.228918 waagent[1542]: 2024-02-09T18:32:45.228853Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:32:45.229367 waagent[1542]: 2024-02-09T18:32:45.229306Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:32:45.237154 waagent[1542]: 2024-02-09T18:32:45.237081Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:32:45.237666 waagent[1542]: 2024-02-09T18:32:45.237603Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:32:45.243740 waagent[1542]: 2024-02-09T18:32:45.243631Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 18:32:45.247445 waagent[1542]: 2024-02-09T18:32:45.247384Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 18:32:45.248998 waagent[1542]: 2024-02-09T18:32:45.248922Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:32:45.249658 waagent[1542]: 2024-02-09T18:32:45.249594Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:45.249925 waagent[1542]: 2024-02-09T18:32:45.249875Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:45.250637 waagent[1542]: 2024-02-09T18:32:45.250570Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:32:45.251287 waagent[1542]: 2024-02-09T18:32:45.251194Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:32:45.251491 waagent[1542]: 2024-02-09T18:32:45.251435Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:32:45.252078 waagent[1542]: 2024-02-09T18:32:45.252005Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:32:45.252078 waagent[1542]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:32:45.252078 waagent[1542]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:32:45.252078 waagent[1542]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:32:45.252078 waagent[1542]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:45.252078 waagent[1542]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:45.252078 waagent[1542]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:32:45.252275 waagent[1542]: 2024-02-09T18:32:45.252169Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:32:45.252678 waagent[1542]: 2024-02-09T18:32:45.252608Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:32:45.252904 waagent[1542]: 2024-02-09T18:32:45.252806Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:32:45.253400 waagent[1542]: 2024-02-09T18:32:45.253317Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:32:45.253825 waagent[1542]: 2024-02-09T18:32:45.253753Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:32:45.256332 waagent[1542]: 2024-02-09T18:32:45.255894Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:32:45.256459 waagent[1542]: 2024-02-09T18:32:45.256391Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:32:45.257605 waagent[1542]: 2024-02-09T18:32:45.257544Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:32:45.258071 waagent[1542]: 2024-02-09T18:32:45.258006Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:32:45.277723 waagent[1542]: 2024-02-09T18:32:45.277629Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 18:32:45.278705 waagent[1542]: 2024-02-09T18:32:45.278628Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 18:32:45.295623 waagent[1542]: 2024-02-09T18:32:45.295558Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:32:45.295623 waagent[1542]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:32:45.295623 waagent[1542]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:32:45.295623 waagent[1542]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f5:da:93 brd ff:ff:ff:ff:ff:ff Feb 9 18:32:45.295623 waagent[1542]: 3: enP57700s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:f5:da:93 brd ff:ff:ff:ff:ff:ff\ altname enP57700p0s2 Feb 9 18:32:45.295623 waagent[1542]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:32:45.295623 waagent[1542]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:32:45.295623 waagent[1542]: 2: eth0 inet 10.200.20.36/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:32:45.295623 waagent[1542]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:32:45.295623 waagent[1542]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:32:45.295623 waagent[1542]: 2: eth0 inet6 fe80::20d:3aff:fef5:da93/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:32:45.309984 waagent[1542]: 2024-02-09T18:32:45.309907Z INFO ExtHandler ExtHandler Feb 9 18:32:45.310229 waagent[1542]: 2024-02-09T18:32:45.310135Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 193be7ab-2f12-43e2-a61f-d74912750fbf correlation c85df726-bb9d-4800-add6-1af299309fec created: 2024-02-09T18:30:40.629539Z] Feb 9 18:32:45.313796 waagent[1542]: 2024-02-09T18:32:45.313711Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 18:32:45.318107 waagent[1542]: 2024-02-09T18:32:45.318036Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 8 ms] Feb 9 18:32:45.341296 waagent[1542]: 2024-02-09T18:32:45.341224Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 18:32:45.366314 waagent[1542]: 2024-02-09T18:32:45.366190Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F90D9746-7EB3-4A1B-AFBA-CB2EC9404AE0;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 18:32:45.534905 waagent[1542]: 2024-02-09T18:32:45.534745Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 18:32:45.534905 waagent[1542]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.534905 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.534905 waagent[1542]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.534905 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.534905 waagent[1542]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.534905 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.534905 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:32:45.534905 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:32:45.534905 waagent[1542]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:32:45.542320 waagent[1542]: 2024-02-09T18:32:45.542189Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 18:32:45.542320 waagent[1542]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.542320 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.542320 waagent[1542]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.542320 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.542320 waagent[1542]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:32:45.542320 waagent[1542]: pkts bytes target prot opt in out source destination Feb 9 18:32:45.542320 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:32:45.542320 waagent[1542]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:32:45.542320 waagent[1542]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:32:45.542839 waagent[1542]: 2024-02-09T18:32:45.542783Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 18:33:07.266798 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 18:33:15.199710 update_engine[1344]: I0209 18:33:15.199666 1344 update_attempter.cc:509] Updating boot flags... Feb 9 18:33:17.805685 systemd[1]: Created slice system-sshd.slice. Feb 9 18:33:17.806838 systemd[1]: Started sshd@0-10.200.20.36:22-10.200.12.6:45328.service. Feb 9 18:33:18.369761 sshd[1632]: Accepted publickey for core from 10.200.12.6 port 45328 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:18.389924 sshd[1632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:18.394583 systemd[1]: Started session-3.scope. Feb 9 18:33:18.395244 systemd-logind[1340]: New session 3 of user core. Feb 9 18:33:18.715522 systemd[1]: Started sshd@1-10.200.20.36:22-10.200.12.6:45344.service. Feb 9 18:33:19.143611 sshd[1637]: Accepted publickey for core from 10.200.12.6 port 45344 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:19.145257 sshd[1637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:19.148940 systemd-logind[1340]: New session 4 of user core. Feb 9 18:33:19.149405 systemd[1]: Started session-4.scope. Feb 9 18:33:19.448626 sshd[1637]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:19.451140 systemd[1]: sshd@1-10.200.20.36:22-10.200.12.6:45344.service: Deactivated successfully. Feb 9 18:33:19.451903 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:33:19.452463 systemd-logind[1340]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:33:19.453402 systemd-logind[1340]: Removed session 4. Feb 9 18:33:19.512710 systemd[1]: Started sshd@2-10.200.20.36:22-10.200.12.6:45350.service. Feb 9 18:33:19.895575 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 45350 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:19.897131 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:19.901265 systemd[1]: Started session-5.scope. Feb 9 18:33:19.902494 systemd-logind[1340]: New session 5 of user core. Feb 9 18:33:20.172443 sshd[1646]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:20.175316 systemd[1]: sshd@2-10.200.20.36:22-10.200.12.6:45350.service: Deactivated successfully. Feb 9 18:33:20.175988 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:33:20.176508 systemd-logind[1340]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:33:20.177181 systemd-logind[1340]: Removed session 5. Feb 9 18:33:20.238849 systemd[1]: Started sshd@3-10.200.20.36:22-10.200.12.6:45352.service. Feb 9 18:33:20.626097 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 45352 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:20.627396 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:20.631110 systemd-logind[1340]: New session 6 of user core. Feb 9 18:33:20.631580 systemd[1]: Started session-6.scope. Feb 9 18:33:20.906732 sshd[1652]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:20.909532 systemd[1]: sshd@3-10.200.20.36:22-10.200.12.6:45352.service: Deactivated successfully. Feb 9 18:33:20.910226 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:33:20.910761 systemd-logind[1340]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:33:20.911562 systemd-logind[1340]: Removed session 6. Feb 9 18:33:20.976722 systemd[1]: Started sshd@4-10.200.20.36:22-10.200.12.6:45362.service. Feb 9 18:33:21.395758 sshd[1658]: Accepted publickey for core from 10.200.12.6 port 45362 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:21.397391 sshd[1658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:21.400992 systemd-logind[1340]: New session 7 of user core. Feb 9 18:33:21.401439 systemd[1]: Started session-7.scope. Feb 9 18:33:21.944670 sudo[1661]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:33:21.944870 sudo[1661]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:21.969445 dbus-daemon[1324]: avc: received setenforce notice (enforcing=1) Feb 9 18:33:21.971273 sudo[1661]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:22.053254 sshd[1658]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:22.056288 systemd-logind[1340]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:33:22.056404 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:33:22.056965 systemd[1]: sshd@4-10.200.20.36:22-10.200.12.6:45362.service: Deactivated successfully. Feb 9 18:33:22.057942 systemd-logind[1340]: Removed session 7. Feb 9 18:33:22.116871 systemd[1]: Started sshd@5-10.200.20.36:22-10.200.12.6:45364.service. Feb 9 18:33:22.500701 sshd[1665]: Accepted publickey for core from 10.200.12.6 port 45364 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:22.502006 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:22.505766 systemd-logind[1340]: New session 8 of user core. Feb 9 18:33:22.506187 systemd[1]: Started session-8.scope. Feb 9 18:33:22.721892 sudo[1669]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:33:22.722094 sudo[1669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:22.724594 sudo[1669]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:22.728788 sudo[1668]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:33:22.728972 sudo[1668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:22.737281 systemd[1]: Stopping audit-rules.service... Feb 9 18:33:22.743223 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 18:33:22.743322 kernel: audit: type=1305 audit(1707503602.737:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:33:22.737000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:33:22.743658 auditctl[1672]: No rules Feb 9 18:33:22.753929 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:33:22.754111 systemd[1]: Stopped audit-rules.service. Feb 9 18:33:22.737000 audit[1672]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef596f80 a2=420 a3=0 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:22.777364 kernel: audit: type=1300 audit(1707503602.737:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef596f80 a2=420 a3=0 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:22.755769 systemd[1]: Starting audit-rules.service... Feb 9 18:33:22.737000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:33:22.784824 kernel: audit: type=1327 audit(1707503602.737:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:33:22.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.800645 kernel: audit: type=1131 audit(1707503602.752:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.800927 augenrules[1689]: No rules Feb 9 18:33:22.801594 systemd[1]: Finished audit-rules.service. Feb 9 18:33:22.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.818197 sudo[1668]: pam_unix(sudo:session): session closed for user root Feb 9 18:33:22.817000 audit[1668]: USER_END pid=1668 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.819305 kernel: audit: type=1130 audit(1707503602.800:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.817000 audit[1668]: CRED_DISP pid=1668 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.855441 kernel: audit: type=1106 audit(1707503602.817:174): pid=1668 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.855514 kernel: audit: type=1104 audit(1707503602.817:175): pid=1668 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.878108 sshd[1665]: pam_unix(sshd:session): session closed for user core Feb 9 18:33:22.877000 audit[1665]: USER_END pid=1665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:22.901992 systemd[1]: sshd@5-10.200.20.36:22-10.200.12.6:45364.service: Deactivated successfully. Feb 9 18:33:22.877000 audit[1665]: CRED_DISP pid=1665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:22.920989 kernel: audit: type=1106 audit(1707503602.877:176): pid=1665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:22.921095 kernel: audit: type=1104 audit(1707503602.877:177): pid=1665 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:22.902718 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 18:33:22.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.36:22-10.200.12.6:45364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.921612 systemd-logind[1340]: Session 8 logged out. Waiting for processes to exit. Feb 9 18:33:22.939598 kernel: audit: type=1131 audit(1707503602.901:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.36:22-10.200.12.6:45364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.36:22-10.200.12.6:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:22.943881 systemd[1]: Started sshd@6-10.200.20.36:22-10.200.12.6:45378.service. Feb 9 18:33:22.944326 systemd-logind[1340]: Removed session 8. Feb 9 18:33:23.325000 audit[1695]: USER_ACCT pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:23.327389 sshd[1695]: Accepted publickey for core from 10.200.12.6 port 45378 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:33:23.327000 audit[1695]: CRED_ACQ pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:23.327000 audit[1695]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd032bb0 a2=3 a3=1 items=0 ppid=1 pid=1695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:23.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:33:23.328990 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:33:23.333422 systemd[1]: Started session-9.scope. Feb 9 18:33:23.333753 systemd-logind[1340]: New session 9 of user core. Feb 9 18:33:23.336000 audit[1695]: USER_START pid=1695 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:23.337000 audit[1697]: CRED_ACQ pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:33:23.547000 audit[1698]: USER_ACCT pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:23.548365 sudo[1698]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:33:23.547000 audit[1698]: CRED_REFR pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:23.548570 sudo[1698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:33:23.548000 audit[1698]: USER_START pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:33:24.227961 systemd[1]: Starting docker.service... Feb 9 18:33:24.284620 env[1713]: time="2024-02-09T18:33:24.284571421Z" level=info msg="Starting up" Feb 9 18:33:24.290001 env[1713]: time="2024-02-09T18:33:24.289960305Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:33:24.290001 env[1713]: time="2024-02-09T18:33:24.289987547Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:33:24.290122 env[1713]: time="2024-02-09T18:33:24.290010908Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:33:24.290122 env[1713]: time="2024-02-09T18:33:24.290022589Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:33:24.291964 env[1713]: time="2024-02-09T18:33:24.291935249Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:33:24.291964 env[1713]: time="2024-02-09T18:33:24.291957011Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:33:24.292080 env[1713]: time="2024-02-09T18:33:24.291970651Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:33:24.292080 env[1713]: time="2024-02-09T18:33:24.291978972Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:33:24.297267 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport429662425-merged.mount: Deactivated successfully. Feb 9 18:33:24.427637 env[1713]: time="2024-02-09T18:33:24.427599919Z" level=info msg="Loading containers: start." Feb 9 18:33:24.494000 audit[1741]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.494000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc3a5c1f0 a2=0 a3=1 items=0 ppid=1713 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 18:33:24.496000 audit[1743]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.496000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffeb95b6c0 a2=0 a3=1 items=0 ppid=1713 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 18:33:24.497000 audit[1745]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.497000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffacacd30 a2=0 a3=1 items=0 ppid=1713 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.497000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:33:24.499000 audit[1747]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.499000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffeb2feb0 a2=0 a3=1 items=0 ppid=1713 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.499000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:33:24.500000 audit[1749]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.500000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffed2e2c0 a2=0 a3=1 items=0 ppid=1713 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 18:33:24.502000 audit[1751]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.502000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffead0ddb0 a2=0 a3=1 items=0 ppid=1713 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 18:33:24.518000 audit[1753]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.518000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe90fab20 a2=0 a3=1 items=0 ppid=1713 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.518000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 18:33:24.520000 audit[1755]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.520000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffffd490da0 a2=0 a3=1 items=0 ppid=1713 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 18:33:24.521000 audit[1757]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.521000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffee69c340 a2=0 a3=1 items=0 ppid=1713 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.521000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:24.537000 audit[1761]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.537000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff0d02f60 a2=0 a3=1 items=0 ppid=1713 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:24.538000 audit[1762]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.538000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc5355590 a2=0 a3=1 items=0 ppid=1713 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.538000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:24.577247 kernel: Initializing XFRM netlink socket Feb 9 18:33:24.650165 env[1713]: time="2024-02-09T18:33:24.650130525Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 18:33:24.740000 audit[1770]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.740000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff7d393e0 a2=0 a3=1 items=0 ppid=1713 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 18:33:24.750000 audit[1773]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.750000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe1ac1460 a2=0 a3=1 items=0 ppid=1713 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 18:33:24.752000 audit[1776]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.752000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc09f8370 a2=0 a3=1 items=0 ppid=1713 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 18:33:24.754000 audit[1778]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.754000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff67d4f80 a2=0 a3=1 items=0 ppid=1713 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 18:33:24.756000 audit[1780]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.756000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc54050d0 a2=0 a3=1 items=0 ppid=1713 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 18:33:24.758000 audit[1782]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.758000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe3d21480 a2=0 a3=1 items=0 ppid=1713 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 18:33:24.759000 audit[1784]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.759000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffde606530 a2=0 a3=1 items=0 ppid=1713 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 18:33:24.761000 audit[1786]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.761000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe1203480 a2=0 a3=1 items=0 ppid=1713 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 18:33:24.763000 audit[1788]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.763000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffa02dc00 a2=0 a3=1 items=0 ppid=1713 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:33:24.765000 audit[1790]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.765000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc12615f0 a2=0 a3=1 items=0 ppid=1713 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:33:24.767000 audit[1792]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.767000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe31951c0 a2=0 a3=1 items=0 ppid=1713 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 18:33:24.769008 systemd-networkd[1504]: docker0: Link UP Feb 9 18:33:24.784000 audit[1796]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.784000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffffdac550 a2=0 a3=1 items=0 ppid=1713 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:24.785000 audit[1797]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:24.785000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe2491b90 a2=0 a3=1 items=0 ppid=1713 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:24.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:33:24.786953 env[1713]: time="2024-02-09T18:33:24.786927774Z" level=info msg="Loading containers: done." Feb 9 18:33:24.796961 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck656020143-merged.mount: Deactivated successfully. Feb 9 18:33:24.828141 env[1713]: time="2024-02-09T18:33:24.828100223Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 18:33:24.828556 env[1713]: time="2024-02-09T18:33:24.828537086Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 18:33:24.828723 env[1713]: time="2024-02-09T18:33:24.828709456Z" level=info msg="Daemon has completed initialization" Feb 9 18:33:24.859586 systemd[1]: Started docker.service. Feb 9 18:33:24.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:24.867530 env[1713]: time="2024-02-09T18:33:24.867471058Z" level=info msg="API listen on /run/docker.sock" Feb 9 18:33:24.883062 systemd[1]: Reloading. Feb 9 18:33:24.964534 /usr/lib/systemd/system-generators/torcx-generator[1843]: time="2024-02-09T18:33:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:33:24.966016 /usr/lib/systemd/system-generators/torcx-generator[1843]: time="2024-02-09T18:33:24Z" level=info msg="torcx already run" Feb 9 18:33:25.019143 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:33:25.019164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:33:25.035533 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.102000 audit: BPF prog-id=35 op=LOAD Feb 9 18:33:25.102000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:33:25.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.104000 audit: BPF prog-id=36 op=LOAD Feb 9 18:33:25.104000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.106000 audit: BPF prog-id=37 op=LOAD Feb 9 18:33:25.106000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:33:25.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit: BPF prog-id=38 op=LOAD Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.107000 audit: BPF prog-id=39 op=LOAD Feb 9 18:33:25.107000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:33:25.107000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:33:25.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.109000 audit: BPF prog-id=40 op=LOAD Feb 9 18:33:25.109000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.110000 audit: BPF prog-id=41 op=LOAD Feb 9 18:33:25.110000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit: BPF prog-id=42 op=LOAD Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit: BPF prog-id=43 op=LOAD Feb 9 18:33:25.112000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:33:25.112000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit: BPF prog-id=44 op=LOAD Feb 9 18:33:25.113000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.113000 audit: BPF prog-id=45 op=LOAD Feb 9 18:33:25.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.114000 audit: BPF prog-id=46 op=LOAD Feb 9 18:33:25.114000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:33:25.114000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.115000 audit: BPF prog-id=47 op=LOAD Feb 9 18:33:25.115000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit: BPF prog-id=48 op=LOAD Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:25.116000 audit: BPF prog-id=49 op=LOAD Feb 9 18:33:25.116000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:33:25.117000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:33:25.124412 systemd[1]: Started kubelet.service. Feb 9 18:33:25.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:25.177711 kubelet[1902]: E0209 18:33:25.177646 1902 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 18:33:25.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:33:25.180000 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:33:25.180122 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:33:29.361885 env[1356]: time="2024-02-09T18:33:29.361846045Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 18:33:30.213056 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1685625128.mount: Deactivated successfully. Feb 9 18:33:31.836348 env[1356]: time="2024-02-09T18:33:31.836296955Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:31.845150 env[1356]: time="2024-02-09T18:33:31.845097002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:31.848564 env[1356]: time="2024-02-09T18:33:31.848531291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:31.853043 env[1356]: time="2024-02-09T18:33:31.853009886Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:31.853720 env[1356]: time="2024-02-09T18:33:31.853681385Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb\"" Feb 9 18:33:31.863214 env[1356]: time="2024-02-09T18:33:31.863157010Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 18:33:33.863016 env[1356]: time="2024-02-09T18:33:33.862970034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:33.871747 env[1356]: time="2024-02-09T18:33:33.871697382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:33.878692 env[1356]: time="2024-02-09T18:33:33.878656978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:33.883349 env[1356]: time="2024-02-09T18:33:33.883315057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:33.884302 env[1356]: time="2024-02-09T18:33:33.884273849Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f\"" Feb 9 18:33:33.894094 env[1356]: time="2024-02-09T18:33:33.894055852Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 18:33:35.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.300531 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 18:33:35.300707 systemd[1]: Stopped kubelet.service. Feb 9 18:33:35.302292 systemd[1]: Started kubelet.service. Feb 9 18:33:35.306228 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 18:33:35.306330 kernel: audit: type=1130 audit(1707503615.299:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.345821 kernel: audit: type=1131 audit(1707503615.299:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.366286 kernel: audit: type=1130 audit(1707503615.301:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:35.407172 kubelet[1931]: E0209 18:33:35.407126 1931 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 18:33:35.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:33:35.410282 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:33:35.410415 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:33:35.433254 kernel: audit: type=1131 audit(1707503615.409:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:33:35.801363 env[1356]: time="2024-02-09T18:33:35.801314718Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:35.806781 env[1356]: time="2024-02-09T18:33:35.806743073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:35.811899 env[1356]: time="2024-02-09T18:33:35.811862882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:35.817053 env[1356]: time="2024-02-09T18:33:35.817016391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:35.817984 env[1356]: time="2024-02-09T18:33:35.817951386Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663\"" Feb 9 18:33:35.828079 env[1356]: time="2024-02-09T18:33:35.828042366Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 18:33:37.067401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560367326.mount: Deactivated successfully. Feb 9 18:33:38.108247 env[1356]: time="2024-02-09T18:33:38.108161404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.115879 env[1356]: time="2024-02-09T18:33:38.115831838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.120891 env[1356]: time="2024-02-09T18:33:38.120840049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.124503 env[1356]: time="2024-02-09T18:33:38.124472291Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.124879 env[1356]: time="2024-02-09T18:33:38.124847297Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 9 18:33:38.134056 env[1356]: time="2024-02-09T18:33:38.134016756Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 18:33:38.894950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1482452145.mount: Deactivated successfully. Feb 9 18:33:38.922554 env[1356]: time="2024-02-09T18:33:38.922502090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.929074 env[1356]: time="2024-02-09T18:33:38.929034553Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.933306 env[1356]: time="2024-02-09T18:33:38.933270043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.938517 env[1356]: time="2024-02-09T18:33:38.938481748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:38.939115 env[1356]: time="2024-02-09T18:33:38.939078360Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 18:33:38.948212 env[1356]: time="2024-02-09T18:33:38.948160624Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 18:33:39.673374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1960555824.mount: Deactivated successfully. Feb 9 18:33:44.994231 env[1356]: time="2024-02-09T18:33:44.994170768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:44.998445 env[1356]: time="2024-02-09T18:33:44.998408659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:45.001467 env[1356]: time="2024-02-09T18:33:45.001434008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:45.004280 env[1356]: time="2024-02-09T18:33:45.004252758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:45.005052 env[1356]: time="2024-02-09T18:33:45.005022707Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Feb 9 18:33:45.013939 env[1356]: time="2024-02-09T18:33:45.013902693Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 18:33:45.550506 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 18:33:45.550685 systemd[1]: Stopped kubelet.service. Feb 9 18:33:45.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.552313 systemd[1]: Started kubelet.service. Feb 9 18:33:45.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.594089 kernel: audit: type=1130 audit(1707503625.549:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.594364 kernel: audit: type=1131 audit(1707503625.549:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.594395 kernel: audit: type=1130 audit(1707503625.551:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:45.649676 kubelet[1957]: E0209 18:33:45.649552 1957 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 18:33:45.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:33:45.652255 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:33:45.652378 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:33:45.674238 kernel: audit: type=1131 audit(1707503625.652:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:33:45.853234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount110700769.mount: Deactivated successfully. Feb 9 18:33:46.389691 env[1356]: time="2024-02-09T18:33:46.389645656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:46.395987 env[1356]: time="2024-02-09T18:33:46.395950258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:46.400685 env[1356]: time="2024-02-09T18:33:46.400631339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:46.404556 env[1356]: time="2024-02-09T18:33:46.404518792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:46.405011 env[1356]: time="2024-02-09T18:33:46.404978600Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 18:33:50.785312 systemd[1]: Stopped kubelet.service. Feb 9 18:33:50.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:50.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:50.827173 kernel: audit: type=1130 audit(1707503630.785:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:50.827310 kernel: audit: type=1131 audit(1707503630.785:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:50.832567 systemd[1]: Reloading. Feb 9 18:33:50.902361 /usr/lib/systemd/system-generators/torcx-generator[2046]: time="2024-02-09T18:33:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:33:50.902392 /usr/lib/systemd/system-generators/torcx-generator[2046]: time="2024-02-09T18:33:50Z" level=info msg="torcx already run" Feb 9 18:33:50.983251 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:33:50.983444 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:33:50.998995 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:33:51.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109878 kernel: audit: type=1400 audit(1707503631.066:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109956 kernel: audit: type=1400 audit(1707503631.067:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129523 kernel: audit: type=1400 audit(1707503631.067:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.150081 kernel: audit: type=1400 audit(1707503631.067:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.170715 kernel: audit: type=1400 audit(1707503631.067:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.191151 kernel: audit: type=1400 audit(1707503631.067:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.191293 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218114 kernel: audit: type=1400 audit(1707503631.067:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit: BPF prog-id=50 op=LOAD Feb 9 18:33:51.087000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit: BPF prog-id=51 op=LOAD Feb 9 18:33:51.109000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit: BPF prog-id=52 op=LOAD Feb 9 18:33:51.129000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit: BPF prog-id=53 op=LOAD Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit: BPF prog-id=54 op=LOAD Feb 9 18:33:51.149000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:33:51.149000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.169000 audit: BPF prog-id=55 op=LOAD Feb 9 18:33:51.169000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:33:51.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit: BPF prog-id=57 op=LOAD Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit: BPF prog-id=59 op=LOAD Feb 9 18:33:51.218000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit: BPF prog-id=60 op=LOAD Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit: BPF prog-id=62 op=LOAD Feb 9 18:33:51.219000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit: BPF prog-id=63 op=LOAD Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.247300 systemd[1]: Started kubelet.service. Feb 9 18:33:51.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:51.289190 kubelet[2106]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:33:51.289534 kubelet[2106]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:33:51.289582 kubelet[2106]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:33:51.289712 kubelet[2106]: I0209 18:33:51.289682 2106 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:33:51.675134 kubelet[2106]: I0209 18:33:51.675100 2106 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 18:33:51.675134 kubelet[2106]: I0209 18:33:51.675128 2106 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:33:51.675364 kubelet[2106]: I0209 18:33:51.675343 2106 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 18:33:51.679907 kubelet[2106]: E0209 18:33:51.679881 2106 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.36:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.680653 kubelet[2106]: I0209 18:33:51.680614 2106 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:33:51.685717 kubelet[2106]: W0209 18:33:51.685686 2106 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:33:51.686257 kubelet[2106]: I0209 18:33:51.686238 2106 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:33:51.686484 kubelet[2106]: I0209 18:33:51.686469 2106 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:33:51.686643 kubelet[2106]: I0209 18:33:51.686624 2106 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 18:33:51.686738 kubelet[2106]: I0209 18:33:51.686649 2106 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 18:33:51.686738 kubelet[2106]: I0209 18:33:51.686657 2106 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 18:33:51.686788 kubelet[2106]: I0209 18:33:51.686756 2106 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:33:51.686862 kubelet[2106]: I0209 18:33:51.686848 2106 kubelet.go:393] "Attempting to sync node with API server" Feb 9 18:33:51.686897 kubelet[2106]: I0209 18:33:51.686865 2106 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:33:51.686897 kubelet[2106]: I0209 18:33:51.686883 2106 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:33:51.686897 kubelet[2106]: I0209 18:33:51.686896 2106 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:33:51.688385 kubelet[2106]: W0209 18:33:51.688333 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.688472 kubelet[2106]: E0209 18:33:51.688394 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.688472 kubelet[2106]: W0209 18:33:51.688451 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-8e9ed585e1&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.688522 kubelet[2106]: E0209 18:33:51.688475 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-8e9ed585e1&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.688592 kubelet[2106]: I0209 18:33:51.688566 2106 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:33:51.688858 kubelet[2106]: W0209 18:33:51.688832 2106 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:33:51.689351 kubelet[2106]: I0209 18:33:51.689323 2106 server.go:1232] "Started kubelet" Feb 9 18:33:51.689000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:51.689000 audit[2106]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c6000 a1=400067f530 a2=400013ee10 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.689000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:51.689000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:51.689000 audit[2106]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b55c40 a1=400067f548 a2=40008c6090 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.689000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:51.691138 kubelet[2106]: I0209 18:33:51.690780 2106 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:33:51.691138 kubelet[2106]: I0209 18:33:51.690816 2106 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:33:51.691138 kubelet[2106]: I0209 18:33:51.690867 2106 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:33:51.692540 kubelet[2106]: E0209 18:33:51.692456 2106 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-8e9ed585e1.17b245819b87c8b4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-8e9ed585e1", UID:"ci-3510.3.2-a-8e9ed585e1", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-8e9ed585e1"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 33, 51, 689304244, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 33, 51, 689304244, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-8e9ed585e1"}': 'Post "https://10.200.20.36:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.36:6443: connect: connection refused'(may retry after sleeping) Feb 9 18:33:51.692000 audit[2117]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.692000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd3b2a2f0 a2=0 a3=1 items=0 ppid=2106 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:33:51.693977 kubelet[2106]: I0209 18:33:51.693961 2106 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:33:51.693000 audit[2118]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.693000 audit[2118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3da9180 a2=0 a3=1 items=0 ppid=2106 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:33:51.694862 kubelet[2106]: I0209 18:33:51.694847 2106 server.go:462] "Adding debug handlers to kubelet server" Feb 9 18:33:51.695540 kubelet[2106]: I0209 18:33:51.695506 2106 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 18:33:51.695982 kubelet[2106]: I0209 18:33:51.695966 2106 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:33:51.696249 kubelet[2106]: I0209 18:33:51.696233 2106 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 18:33:51.695000 audit[2120]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.695000 audit[2120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdc9d83a0 a2=0 a3=1 items=0 ppid=2106 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:33:51.697053 kubelet[2106]: E0209 18:33:51.697039 2106 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": dial tcp 10.200.20.36:6443: connect: connection refused" interval="200ms" Feb 9 18:33:51.697374 kubelet[2106]: E0209 18:33:51.697357 2106 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:33:51.697476 kubelet[2106]: E0209 18:33:51.697465 2106 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:33:51.697768 kubelet[2106]: I0209 18:33:51.697755 2106 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:33:51.698230 kubelet[2106]: W0209 18:33:51.698172 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.698340 kubelet[2106]: E0209 18:33:51.698328 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.699142 kubelet[2106]: I0209 18:33:51.699126 2106 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 18:33:51.699000 audit[2122]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.699000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff7804940 a2=0 a3=1 items=0 ppid=2106 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:33:51.749000 audit[2128]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.749000 audit[2128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdcef97d0 a2=0 a3=1 items=0 ppid=2106 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:33:51.751815 kubelet[2106]: I0209 18:33:51.751788 2106 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 18:33:51.751000 audit[2129]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:33:51.751000 audit[2129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4014100 a2=0 a3=1 items=0 ppid=2106 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:33:51.752825 kubelet[2106]: I0209 18:33:51.752794 2106 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 18:33:51.752880 kubelet[2106]: I0209 18:33:51.752830 2106 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 18:33:51.752880 kubelet[2106]: I0209 18:33:51.752849 2106 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 18:33:51.752930 kubelet[2106]: E0209 18:33:51.752897 2106 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:33:51.752000 audit[2130]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.752000 audit[2130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd94fdd60 a2=0 a3=1 items=0 ppid=2106 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:33:51.754638 kubelet[2106]: W0209 18:33:51.754585 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.754772 kubelet[2106]: E0209 18:33:51.754761 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:51.753000 audit[2133]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:33:51.753000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1108630 a2=0 a3=1 items=0 ppid=2106 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:33:51.754000 audit[2134]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.754000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf100870 a2=0 a3=1 items=0 ppid=2106 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:33:51.755000 audit[2135]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:33:51.755000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc82c2d80 a2=0 a3=1 items=0 ppid=2106 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:33:51.756000 audit[2136]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:33:51.756000 audit[2136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb1d2ae0 a2=0 a3=1 items=0 ppid=2106 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:33:51.757000 audit[2137]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:33:51.757000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc220c320 a2=0 a3=1 items=0 ppid=2106 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:33:51.825025 kubelet[2106]: I0209 18:33:51.824997 2106 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:51.826141 kubelet[2106]: E0209 18:33:51.826117 2106 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:51.826346 kubelet[2106]: I0209 18:33:51.826126 2106 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:33:51.826437 kubelet[2106]: I0209 18:33:51.826426 2106 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:33:51.826513 kubelet[2106]: I0209 18:33:51.826505 2106 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:33:51.831461 kubelet[2106]: I0209 18:33:51.831432 2106 policy_none.go:49] "None policy: Start" Feb 9 18:33:51.832131 kubelet[2106]: I0209 18:33:51.832114 2106 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:33:51.832188 kubelet[2106]: I0209 18:33:51.832143 2106 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:33:51.839120 systemd[1]: Created slice kubepods.slice. Feb 9 18:33:51.844071 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:33:51.853906 kubelet[2106]: E0209 18:33:51.853873 2106 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 18:33:51.856344 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:33:51.857000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:51.857000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:51.857000 audit[2106]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010235c0 a1=400105c408 a2=4001023590 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:51.857000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:51.859172 kubelet[2106]: I0209 18:33:51.858711 2106 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:33:51.859172 kubelet[2106]: I0209 18:33:51.858787 2106 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:33:51.859172 kubelet[2106]: I0209 18:33:51.859105 2106 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:33:51.860418 kubelet[2106]: E0209 18:33:51.860395 2106 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-8e9ed585e1\" not found" Feb 9 18:33:51.898557 kubelet[2106]: E0209 18:33:51.898528 2106 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": dial tcp 10.200.20.36:6443: connect: connection refused" interval="400ms" Feb 9 18:33:52.027618 kubelet[2106]: I0209 18:33:52.027520 2106 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.029782 kubelet[2106]: E0209 18:33:52.029755 2106 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.054985 kubelet[2106]: I0209 18:33:52.054957 2106 topology_manager.go:215] "Topology Admit Handler" podUID="af4d05f8896aa759685b76deb6492111" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.056388 kubelet[2106]: I0209 18:33:52.056364 2106 topology_manager.go:215] "Topology Admit Handler" podUID="cc4de7c3709205dfc3a09cbd10a6ab58" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.058509 kubelet[2106]: I0209 18:33:52.058232 2106 topology_manager.go:215] "Topology Admit Handler" podUID="4788f24f1a631ac796b60bc84e428d57" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.063302 systemd[1]: Created slice kubepods-burstable-podaf4d05f8896aa759685b76deb6492111.slice. Feb 9 18:33:52.075497 systemd[1]: Created slice kubepods-burstable-podcc4de7c3709205dfc3a09cbd10a6ab58.slice. Feb 9 18:33:52.079677 systemd[1]: Created slice kubepods-burstable-pod4788f24f1a631ac796b60bc84e428d57.slice. Feb 9 18:33:52.101149 kubelet[2106]: I0209 18:33:52.101120 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4788f24f1a631ac796b60bc84e428d57-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-8e9ed585e1\" (UID: \"4788f24f1a631ac796b60bc84e428d57\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101390 kubelet[2106]: I0209 18:33:52.101377 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101516 kubelet[2106]: I0209 18:33:52.101506 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101623 kubelet[2106]: I0209 18:33:52.101614 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101730 kubelet[2106]: I0209 18:33:52.101720 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101836 kubelet[2106]: I0209 18:33:52.101826 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.101952 kubelet[2106]: I0209 18:33:52.101942 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.102061 kubelet[2106]: I0209 18:33:52.102051 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.102164 kubelet[2106]: I0209 18:33:52.102155 2106 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.299145 kubelet[2106]: E0209 18:33:52.299045 2106 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": dial tcp 10.200.20.36:6443: connect: connection refused" interval="800ms" Feb 9 18:33:52.375045 env[1356]: time="2024-02-09T18:33:52.375003096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-8e9ed585e1,Uid:af4d05f8896aa759685b76deb6492111,Namespace:kube-system,Attempt:0,}" Feb 9 18:33:52.379367 env[1356]: time="2024-02-09T18:33:52.379323343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-8e9ed585e1,Uid:cc4de7c3709205dfc3a09cbd10a6ab58,Namespace:kube-system,Attempt:0,}" Feb 9 18:33:52.383444 env[1356]: time="2024-02-09T18:33:52.383243494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-8e9ed585e1,Uid:4788f24f1a631ac796b60bc84e428d57,Namespace:kube-system,Attempt:0,}" Feb 9 18:33:52.431793 kubelet[2106]: I0209 18:33:52.431767 2106 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.432438 kubelet[2106]: E0209 18:33:52.432418 2106 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:52.607628 kubelet[2106]: W0209 18:33:52.607528 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:52.607628 kubelet[2106]: E0209 18:33:52.607590 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:52.756402 kubelet[2106]: W0209 18:33:52.756347 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:52.756402 kubelet[2106]: E0209 18:33:52.756403 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:53.036370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3063541726.mount: Deactivated successfully. Feb 9 18:33:53.081254 env[1356]: time="2024-02-09T18:33:53.081177475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.084482 env[1356]: time="2024-02-09T18:33:53.084444210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.097587 env[1356]: time="2024-02-09T18:33:53.097543138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.100171 kubelet[2106]: E0209 18:33:53.100135 2106 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": dial tcp 10.200.20.36:6443: connect: connection refused" interval="1.6s" Feb 9 18:33:53.101847 env[1356]: time="2024-02-09T18:33:53.101793168Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.107735 env[1356]: time="2024-02-09T18:33:53.107690460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.115752 env[1356]: time="2024-02-09T18:33:53.115693415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.120435 env[1356]: time="2024-02-09T18:33:53.120390528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.129322 env[1356]: time="2024-02-09T18:33:53.129282491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.133541 env[1356]: time="2024-02-09T18:33:53.133496373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.139042 env[1356]: time="2024-02-09T18:33:53.139009361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.145383 env[1356]: time="2024-02-09T18:33:53.145346699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.171321 env[1356]: time="2024-02-09T18:33:53.171279728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:33:53.186080 kubelet[2106]: W0209 18:33:53.186022 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-8e9ed585e1&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:53.186080 kubelet[2106]: E0209 18:33:53.186083 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-8e9ed585e1&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:53.204318 env[1356]: time="2024-02-09T18:33:53.204109659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:33:53.204318 env[1356]: time="2024-02-09T18:33:53.204154403Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:33:53.204318 env[1356]: time="2024-02-09T18:33:53.204173516Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:33:53.206145 env[1356]: time="2024-02-09T18:33:53.206075369Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a pid=2146 runtime=io.containerd.runc.v2 Feb 9 18:33:53.213086 env[1356]: time="2024-02-09T18:33:53.213023774Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:33:53.213319 env[1356]: time="2024-02-09T18:33:53.213293559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:33:53.213405 env[1356]: time="2024-02-09T18:33:53.213385247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:33:53.213721 env[1356]: time="2024-02-09T18:33:53.213687981Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0 pid=2165 runtime=io.containerd.runc.v2 Feb 9 18:33:53.216661 kubelet[2106]: W0209 18:33:53.216574 2106 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:53.216661 kubelet[2106]: E0209 18:33:53.216638 2106 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 9 18:33:53.228021 systemd[1]: Started cri-containerd-ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a.scope. Feb 9 18:33:53.235094 kubelet[2106]: I0209 18:33:53.234696 2106 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:53.235094 kubelet[2106]: E0209 18:33:53.235071 2106 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.243000 audit: BPF prog-id=65 op=LOAD Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2146 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376362393631613465356335623663383334366234333166616639 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2146 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376362393631613465356335623663383334366234333166616639 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.244000 audit: BPF prog-id=66 op=LOAD Feb 9 18:33:53.244000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2146 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376362393631613465356335623663383334366234333166616639 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.245000 audit: BPF prog-id=67 op=LOAD Feb 9 18:33:53.245000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2146 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376362393631613465356335623663383334366234333166616639 Feb 9 18:33:53.245000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:33:53.245000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { perfmon } for pid=2170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit[2170]: AVC avc: denied { bpf } for pid=2170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.246000 audit: BPF prog-id=68 op=LOAD Feb 9 18:33:53.246000 audit[2170]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2146 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564376362393631613465356335623663383334366234333166616639 Feb 9 18:33:53.255653 env[1356]: time="2024-02-09T18:33:53.253173698Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:33:53.255653 env[1356]: time="2024-02-09T18:33:53.253272784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:33:53.255653 env[1356]: time="2024-02-09T18:33:53.253298455Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:33:53.255653 env[1356]: time="2024-02-09T18:33:53.253423611Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/893610cf2b0a6497a6a97c12952e143fcb18cf9f2fe00ecef145b8a5e0fd91fa pid=2207 runtime=io.containerd.runc.v2 Feb 9 18:33:53.261063 systemd[1]: Started cri-containerd-4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0.scope. Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.275000 audit: BPF prog-id=69 op=LOAD Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2165 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432313065333737313337656465396435306333343838666631393431 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2165 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432313065333737313337656465396435306333343838666631393431 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.276000 audit: BPF prog-id=70 op=LOAD Feb 9 18:33:53.276000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2165 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432313065333737313337656465396435306333343838666631393431 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit: BPF prog-id=71 op=LOAD Feb 9 18:33:53.277000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2165 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432313065333737313337656465396435306333343838666631393431 Feb 9 18:33:53.277000 audit: BPF prog-id=71 op=UNLOAD Feb 9 18:33:53.277000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.277000 audit: BPF prog-id=72 op=LOAD Feb 9 18:33:53.277000 audit[2183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2165 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432313065333737313337656465396435306333343838666631393431 Feb 9 18:33:53.284027 systemd[1]: Started cri-containerd-893610cf2b0a6497a6a97c12952e143fcb18cf9f2fe00ecef145b8a5e0fd91fa.scope. Feb 9 18:33:53.295395 env[1356]: time="2024-02-09T18:33:53.292864664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-8e9ed585e1,Uid:cc4de7c3709205dfc3a09cbd10a6ab58,Namespace:kube-system,Attempt:0,} returns sandbox id \"ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a\"" Feb 9 18:33:53.304471 env[1356]: time="2024-02-09T18:33:53.304413455Z" level=info msg="CreateContainer within sandbox \"ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.313000 audit: BPF prog-id=73 op=LOAD Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2207 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333631306366326230613634393761366139376331323935326531 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2207 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333631306366326230613634393761366139376331323935326531 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit: BPF prog-id=74 op=LOAD Feb 9 18:33:53.314000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2207 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333631306366326230613634393761366139376331323935326531 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit: BPF prog-id=75 op=LOAD Feb 9 18:33:53.314000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2207 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333631306366326230613634393761366139376331323935326531 Feb 9 18:33:53.314000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:33:53.314000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.314000 audit: BPF prog-id=76 op=LOAD Feb 9 18:33:53.314000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2207 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333631306366326230613634393761366139376331323935326531 Feb 9 18:33:53.319966 env[1356]: time="2024-02-09T18:33:53.319913141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-8e9ed585e1,Uid:4788f24f1a631ac796b60bc84e428d57,Namespace:kube-system,Attempt:0,} returns sandbox id \"4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0\"" Feb 9 18:33:53.323325 env[1356]: time="2024-02-09T18:33:53.323277482Z" level=info msg="CreateContainer within sandbox \"4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 18:33:53.346350 env[1356]: time="2024-02-09T18:33:53.346299651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-8e9ed585e1,Uid:af4d05f8896aa759685b76deb6492111,Namespace:kube-system,Attempt:0,} returns sandbox id \"893610cf2b0a6497a6a97c12952e143fcb18cf9f2fe00ecef145b8a5e0fd91fa\"" Feb 9 18:33:53.349089 env[1356]: time="2024-02-09T18:33:53.349048607Z" level=info msg="CreateContainer within sandbox \"893610cf2b0a6497a6a97c12952e143fcb18cf9f2fe00ecef145b8a5e0fd91fa\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 18:33:53.375437 env[1356]: time="2024-02-09T18:33:53.375384695Z" level=info msg="CreateContainer within sandbox \"ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2\"" Feb 9 18:33:53.376486 env[1356]: time="2024-02-09T18:33:53.376458718Z" level=info msg="StartContainer for \"d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2\"" Feb 9 18:33:53.382854 env[1356]: time="2024-02-09T18:33:53.382788019Z" level=info msg="CreateContainer within sandbox \"4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535\"" Feb 9 18:33:53.383402 env[1356]: time="2024-02-09T18:33:53.383378972Z" level=info msg="StartContainer for \"371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535\"" Feb 9 18:33:53.394571 systemd[1]: Started cri-containerd-d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2.scope. Feb 9 18:33:53.411417 systemd[1]: Started cri-containerd-371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535.scope. Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.418000 audit: BPF prog-id=77 op=LOAD Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439386534343362643366633263366365396265396135663736653830 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439386534343362643366633263366365396265396135663736653830 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit: BPF prog-id=78 op=LOAD Feb 9 18:33:53.419000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439386534343362643366633263366365396265396135663736653830 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit: BPF prog-id=79 op=LOAD Feb 9 18:33:53.419000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439386534343362643366633263366365396265396135663736653830 Feb 9 18:33:53.419000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:33:53.419000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.419000 audit: BPF prog-id=80 op=LOAD Feb 9 18:33:53.419000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2146 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439386534343362643366633263366365396265396135663736653830 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.425000 audit: BPF prog-id=81 op=LOAD Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316139306137623535613566383166393561333735396561363037 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316139306137623535613566383166393561333735396561363037 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit: BPF prog-id=82 op=LOAD Feb 9 18:33:53.426000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316139306137623535613566383166393561333735396561363037 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit: BPF prog-id=83 op=LOAD Feb 9 18:33:53.426000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316139306137623535613566383166393561333735396561363037 Feb 9 18:33:53.426000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:33:53.426000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.426000 audit: BPF prog-id=84 op=LOAD Feb 9 18:33:53.426000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337316139306137623535613566383166393561333735396561363037 Feb 9 18:33:53.433254 env[1356]: time="2024-02-09T18:33:53.433190910Z" level=info msg="CreateContainer within sandbox \"893610cf2b0a6497a6a97c12952e143fcb18cf9f2fe00ecef145b8a5e0fd91fa\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2c1d0c00888b04507b4e75d72d9f8a6c5ac144ad453e313e65ffc9d27100b35e\"" Feb 9 18:33:53.433991 env[1356]: time="2024-02-09T18:33:53.433952163Z" level=info msg="StartContainer for \"2c1d0c00888b04507b4e75d72d9f8a6c5ac144ad453e313e65ffc9d27100b35e\"" Feb 9 18:33:53.461530 systemd[1]: Started cri-containerd-2c1d0c00888b04507b4e75d72d9f8a6c5ac144ad453e313e65ffc9d27100b35e.scope. Feb 9 18:33:53.463343 env[1356]: time="2024-02-09T18:33:53.463309031Z" level=info msg="StartContainer for \"d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2\" returns successfully" Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.479000 audit: BPF prog-id=85 op=LOAD Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2207 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263316430633030383838623034353037623465373564373264396638 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2207 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263316430633030383838623034353037623465373564373264396638 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.480000 audit: BPF prog-id=86 op=LOAD Feb 9 18:33:53.481646 env[1356]: time="2024-02-09T18:33:53.481609895Z" level=info msg="StartContainer for \"371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535\" returns successfully" Feb 9 18:33:53.480000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2207 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263316430633030383838623034353037623465373564373264396638 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.481000 audit: BPF prog-id=87 op=LOAD Feb 9 18:33:53.481000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2207 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263316430633030383838623034353037623465373564373264396638 Feb 9 18:33:53.482000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:33:53.482000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:53.482000 audit: BPF prog-id=88 op=LOAD Feb 9 18:33:53.482000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2207 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:53.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263316430633030383838623034353037623465373564373264396638 Feb 9 18:33:53.512552 env[1356]: time="2024-02-09T18:33:53.512500026Z" level=info msg="StartContainer for \"2c1d0c00888b04507b4e75d72d9f8a6c5ac144ad453e313e65ffc9d27100b35e\" returns successfully" Feb 9 18:33:54.836863 kubelet[2106]: I0209 18:33:54.836825 2106 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:55.797000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.804730 kernel: kauditd_printk_skb: 633 callbacks suppressed Feb 9 18:33:55.804861 kernel: audit: type=1400 audit(1707503635.797:654): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.797000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.876218 kernel: audit: type=1400 audit(1707503635.797:655): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.797000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400387b8f0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.907163 kernel: audit: type=1300 audit(1707503635.797:655): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400387b8f0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.907313 kernel: audit: type=1327 audit(1707503635.797:655): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.809000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.961179 kernel: audit: type=1400 audit(1707503635.809:656): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.809000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40034a6c60 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.995728 kernel: audit: type=1300 audit(1707503635.809:656): arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40034a6c60 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:56.033822 kernel: audit: type=1327 audit(1707503635.809:656): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:56.033973 kernel: audit: type=1400 audit(1707503635.819:657): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.819000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.819000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006040080 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:56.088997 kernel: audit: type=1300 audit(1707503635.819:657): arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006040080 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:56.121041 kernel: audit: type=1327 audit(1707503635.819:657): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.829000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.829000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40062a9f20 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.829000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.829000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.829000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4003697020 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.829000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.797000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4009a0d860 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:33:55.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:33:55.950000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.950000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013b650 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:33:55.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:33:55.950000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:33:55.950000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e58200 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:33:55.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:33:56.199470 kubelet[2106]: E0209 18:33:56.199427 2106 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-8e9ed585e1\" not found" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:56.283557 kubelet[2106]: I0209 18:33:56.283524 2106 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:56.689661 kubelet[2106]: I0209 18:33:56.689608 2106 apiserver.go:52] "Watching apiserver" Feb 9 18:33:56.697988 kubelet[2106]: I0209 18:33:56.697944 2106 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:33:58.887700 systemd[1]: Reloading. Feb 9 18:33:58.980061 /usr/lib/systemd/system-generators/torcx-generator[2398]: time="2024-02-09T18:33:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:33:58.980483 /usr/lib/systemd/system-generators/torcx-generator[2398]: time="2024-02-09T18:33:58Z" level=info msg="torcx already run" Feb 9 18:33:59.069085 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:33:59.069105 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:33:59.086577 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.173000 audit: BPF prog-id=89 op=LOAD Feb 9 18:33:59.173000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.174000 audit: BPF prog-id=90 op=LOAD Feb 9 18:33:59.174000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.175000 audit: BPF prog-id=91 op=LOAD Feb 9 18:33:59.175000 audit: BPF prog-id=65 op=UNLOAD Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.176000 audit: BPF prog-id=92 op=LOAD Feb 9 18:33:59.176000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit: BPF prog-id=93 op=LOAD Feb 9 18:33:59.177000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.177000 audit: BPF prog-id=94 op=LOAD Feb 9 18:33:59.177000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit: BPF prog-id=95 op=LOAD Feb 9 18:33:59.180000 audit: BPF prog-id=52 op=UNLOAD Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit: BPF prog-id=96 op=LOAD Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.180000 audit: BPF prog-id=97 op=LOAD Feb 9 18:33:59.180000 audit: BPF prog-id=53 op=UNLOAD Feb 9 18:33:59.180000 audit: BPF prog-id=54 op=UNLOAD Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit: BPF prog-id=98 op=LOAD Feb 9 18:33:59.181000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit: BPF prog-id=99 op=LOAD Feb 9 18:33:59.182000 audit: BPF prog-id=55 op=UNLOAD Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.182000 audit: BPF prog-id=100 op=LOAD Feb 9 18:33:59.182000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.183000 audit: BPF prog-id=101 op=LOAD Feb 9 18:33:59.183000 audit: BPF prog-id=56 op=UNLOAD Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit: BPF prog-id=102 op=LOAD Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit: BPF prog-id=103 op=LOAD Feb 9 18:33:59.184000 audit: BPF prog-id=57 op=UNLOAD Feb 9 18:33:59.184000 audit: BPF prog-id=58 op=UNLOAD Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit: BPF prog-id=104 op=LOAD Feb 9 18:33:59.184000 audit: BPF prog-id=59 op=UNLOAD Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit: BPF prog-id=105 op=LOAD Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit: BPF prog-id=106 op=LOAD Feb 9 18:33:59.185000 audit: BPF prog-id=60 op=UNLOAD Feb 9 18:33:59.185000 audit: BPF prog-id=61 op=UNLOAD Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit: BPF prog-id=107 op=LOAD Feb 9 18:33:59.185000 audit: BPF prog-id=62 op=UNLOAD Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit: BPF prog-id=108 op=LOAD Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.186000 audit: BPF prog-id=109 op=LOAD Feb 9 18:33:59.186000 audit: BPF prog-id=63 op=UNLOAD Feb 9 18:33:59.186000 audit: BPF prog-id=64 op=UNLOAD Feb 9 18:33:59.209990 kubelet[2106]: I0209 18:33:59.209011 2106 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:33:59.209569 systemd[1]: Stopping kubelet.service... Feb 9 18:33:59.235646 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 18:33:59.236009 systemd[1]: Stopped kubelet.service. Feb 9 18:33:59.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:59.238937 systemd[1]: Started kubelet.service. Feb 9 18:33:59.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:33:59.315880 kubelet[2458]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:33:59.316194 kubelet[2458]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:33:59.316263 kubelet[2458]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:33:59.316391 kubelet[2458]: I0209 18:33:59.316357 2458 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:33:59.321087 kubelet[2458]: I0209 18:33:59.321057 2458 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 18:33:59.321287 kubelet[2458]: I0209 18:33:59.321275 2458 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:33:59.321648 kubelet[2458]: I0209 18:33:59.321633 2458 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 18:33:59.323329 kubelet[2458]: I0209 18:33:59.323310 2458 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 18:33:59.325293 kubelet[2458]: I0209 18:33:59.325276 2458 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:33:59.329953 kubelet[2458]: W0209 18:33:59.329930 2458 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:33:59.331672 kubelet[2458]: I0209 18:33:59.331649 2458 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:33:59.331987 kubelet[2458]: I0209 18:33:59.331973 2458 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:33:59.332322 kubelet[2458]: I0209 18:33:59.332192 2458 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 18:33:59.332451 kubelet[2458]: I0209 18:33:59.332439 2458 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 18:33:59.332519 kubelet[2458]: I0209 18:33:59.332510 2458 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 18:33:59.332600 kubelet[2458]: I0209 18:33:59.332591 2458 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:33:59.332775 kubelet[2458]: I0209 18:33:59.332764 2458 kubelet.go:393] "Attempting to sync node with API server" Feb 9 18:33:59.332856 kubelet[2458]: I0209 18:33:59.332847 2458 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:33:59.332925 kubelet[2458]: I0209 18:33:59.332916 2458 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:33:59.332988 kubelet[2458]: I0209 18:33:59.332980 2458 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:33:59.334461 kubelet[2458]: I0209 18:33:59.334443 2458 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:33:59.335004 kubelet[2458]: I0209 18:33:59.334988 2458 server.go:1232] "Started kubelet" Feb 9 18:33:59.335000 audit[2458]: AVC avc: denied { mac_admin } for pid=2458 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.335000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:59.335000 audit[2458]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000507aa0 a1=40007d1ce0 a2=4000507a70 a3=25 items=0 ppid=1 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:59.335000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:59.336894 kubelet[2458]: I0209 18:33:59.336880 2458 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:33:59.335000 audit[2458]: AVC avc: denied { mac_admin } for pid=2458 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.335000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:59.335000 audit[2458]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400056e760 a1=40007d1cf8 a2=4000507b30 a3=25 items=0 ppid=1 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:59.335000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:59.337151 kubelet[2458]: I0209 18:33:59.337139 2458 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:33:59.337242 kubelet[2458]: I0209 18:33:59.337232 2458 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:33:59.341165 kubelet[2458]: I0209 18:33:59.341146 2458 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:33:59.347448 kubelet[2458]: I0209 18:33:59.347428 2458 server.go:462] "Adding debug handlers to kubelet server" Feb 9 18:33:59.348568 kubelet[2458]: I0209 18:33:59.348551 2458 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:33:59.348813 kubelet[2458]: I0209 18:33:59.348801 2458 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 18:33:59.350411 kubelet[2458]: I0209 18:33:59.350393 2458 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 18:33:59.352527 kubelet[2458]: E0209 18:33:59.352398 2458 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:33:59.352527 kubelet[2458]: E0209 18:33:59.352438 2458 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:33:59.361658 kubelet[2458]: I0209 18:33:59.361639 2458 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:33:59.361882 kubelet[2458]: I0209 18:33:59.361871 2458 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 18:33:59.363277 kubelet[2458]: I0209 18:33:59.363254 2458 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 18:33:59.364227 kubelet[2458]: I0209 18:33:59.364210 2458 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 18:33:59.364338 kubelet[2458]: I0209 18:33:59.364327 2458 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 18:33:59.364407 kubelet[2458]: I0209 18:33:59.364398 2458 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 18:33:59.364498 kubelet[2458]: E0209 18:33:59.364490 2458 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:33:59.448017 kubelet[2458]: I0209 18:33:59.447922 2458 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:33:59.451258 kubelet[2458]: I0209 18:33:59.451239 2458 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:33:59.451671 kubelet[2458]: I0209 18:33:59.451657 2458 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:33:59.451939 kubelet[2458]: I0209 18:33:59.451928 2458 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 18:33:59.452023 kubelet[2458]: I0209 18:33:59.452014 2458 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 18:33:59.452097 kubelet[2458]: I0209 18:33:59.452088 2458 policy_none.go:49] "None policy: Start" Feb 9 18:33:59.454517 kubelet[2458]: I0209 18:33:59.454490 2458 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:33:59.454634 kubelet[2458]: I0209 18:33:59.454624 2458 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:33:59.454915 kubelet[2458]: I0209 18:33:59.454902 2458 state_mem.go:75] "Updated machine memory state" Feb 9 18:33:59.456372 kubelet[2458]: I0209 18:33:59.456355 2458 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.465300 kubelet[2458]: E0209 18:33:59.465256 2458 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 18:33:59.471789 kubelet[2458]: I0209 18:33:59.471766 2458 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.471952 kubelet[2458]: I0209 18:33:59.471941 2458 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.472175 kubelet[2458]: I0209 18:33:59.471841 2458 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:33:59.472000 audit[2458]: AVC avc: denied { mac_admin } for pid=2458 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:33:59.472000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:33:59.472000 audit[2458]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e09e00 a1=4000e6f470 a2=4000e09dd0 a3=25 items=0 ppid=1 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:33:59.472000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:33:59.474649 kubelet[2458]: I0209 18:33:59.474149 2458 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:33:59.474649 kubelet[2458]: I0209 18:33:59.474407 2458 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:33:59.666366 kubelet[2458]: I0209 18:33:59.666331 2458 topology_manager.go:215] "Topology Admit Handler" podUID="af4d05f8896aa759685b76deb6492111" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.666637 kubelet[2458]: I0209 18:33:59.666622 2458 topology_manager.go:215] "Topology Admit Handler" podUID="cc4de7c3709205dfc3a09cbd10a6ab58" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.666745 kubelet[2458]: I0209 18:33:59.666734 2458 topology_manager.go:215] "Topology Admit Handler" podUID="4788f24f1a631ac796b60bc84e428d57" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.675368 kubelet[2458]: W0209 18:33:59.675340 2458 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:33:59.683026 kubelet[2458]: W0209 18:33:59.682984 2458 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:33:59.683228 kubelet[2458]: W0209 18:33:59.683199 2458 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:33:59.764135 kubelet[2458]: I0209 18:33:59.764038 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764135 kubelet[2458]: I0209 18:33:59.764087 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764135 kubelet[2458]: I0209 18:33:59.764109 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764135 kubelet[2458]: I0209 18:33:59.764130 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764349 kubelet[2458]: I0209 18:33:59.764166 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764349 kubelet[2458]: I0209 18:33:59.764189 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/af4d05f8896aa759685b76deb6492111-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" (UID: \"af4d05f8896aa759685b76deb6492111\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764349 kubelet[2458]: I0209 18:33:59.764224 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764349 kubelet[2458]: I0209 18:33:59.764245 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cc4de7c3709205dfc3a09cbd10a6ab58-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-8e9ed585e1\" (UID: \"cc4de7c3709205dfc3a09cbd10a6ab58\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:33:59.764349 kubelet[2458]: I0209 18:33:59.764267 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4788f24f1a631ac796b60bc84e428d57-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-8e9ed585e1\" (UID: \"4788f24f1a631ac796b60bc84e428d57\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:00.344943 kubelet[2458]: I0209 18:34:00.344901 2458 apiserver.go:52] "Watching apiserver" Feb 9 18:34:00.362730 kubelet[2458]: I0209 18:34:00.362680 2458 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:34:00.445263 kubelet[2458]: W0209 18:34:00.445231 2458 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 18:34:00.445421 kubelet[2458]: E0209 18:34:00.445314 2458 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-8e9ed585e1\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:00.484181 kubelet[2458]: I0209 18:34:00.484145 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" podStartSLOduration=1.48408486 podCreationTimestamp="2024-02-09 18:33:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:00.463238674 +0000 UTC m=+1.219557474" watchObservedRunningTime="2024-02-09 18:34:00.48408486 +0000 UTC m=+1.240403660" Feb 9 18:34:00.526006 kubelet[2458]: I0209 18:34:00.525714 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-8e9ed585e1" podStartSLOduration=1.525674581 podCreationTimestamp="2024-02-09 18:33:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:00.486419448 +0000 UTC m=+1.242738248" watchObservedRunningTime="2024-02-09 18:34:00.525674581 +0000 UTC m=+1.281993381" Feb 9 18:34:00.569846 kubelet[2458]: I0209 18:34:00.569805 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-8e9ed585e1" podStartSLOduration=1.56976728 podCreationTimestamp="2024-02-09 18:33:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:00.526918012 +0000 UTC m=+1.283236812" watchObservedRunningTime="2024-02-09 18:34:00.56976728 +0000 UTC m=+1.326086080" Feb 9 18:34:04.767686 sudo[1698]: pam_unix(sudo:session): session closed for user root Feb 9 18:34:04.766000 audit[1698]: USER_END pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.773705 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 18:34:04.773812 kernel: audit: type=1106 audit(1707503644.766:911): pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.769000 audit[1698]: CRED_DISP pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.821244 kernel: audit: type=1104 audit(1707503644.769:912): pid=1698 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.860060 sshd[1695]: pam_unix(sshd:session): session closed for user core Feb 9 18:34:04.859000 audit[1695]: USER_END pid=1695 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:04.859000 audit[1695]: CRED_DISP pid=1695 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:04.892363 systemd[1]: sshd@6-10.200.20.36:22-10.200.12.6:45378.service: Deactivated successfully. Feb 9 18:34:04.893133 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 18:34:04.893320 systemd[1]: session-9.scope: Consumed 5.598s CPU time. Feb 9 18:34:04.916988 kernel: audit: type=1106 audit(1707503644.859:913): pid=1695 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:04.917111 kernel: audit: type=1104 audit(1707503644.859:914): pid=1695 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:34:04.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.36:22-10.200.12.6:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.917596 systemd-logind[1340]: Session 9 logged out. Waiting for processes to exit. Feb 9 18:34:04.941870 kernel: audit: type=1131 audit(1707503644.890:915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.36:22-10.200.12.6:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:04.942878 systemd-logind[1340]: Removed session 9. Feb 9 18:34:08.547000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.547000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e59080 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.609540 kernel: audit: type=1400 audit(1707503648.547:916): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.609693 kernel: audit: type=1300 audit(1707503648.547:916): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e59080 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.547000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:08.638485 kernel: audit: type=1327 audit(1707503648.547:916): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:08.548000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.667388 kernel: audit: type=1400 audit(1707503648.548:917): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.548000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e590c0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.704399 kernel: audit: type=1300 audit(1707503648.548:917): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e590c0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.548000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:08.550000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.550000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e59200 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:08.551000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:08.551000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e59340 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:08.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:09.510000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 18:34:09.510000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ebcc80 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:09.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:11.509712 kubelet[2458]: I0209 18:34:11.509676 2458 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 18:34:11.510435 env[1356]: time="2024-02-09T18:34:11.510402051Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:34:11.510954 kubelet[2458]: I0209 18:34:11.510925 2458 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 18:34:12.140015 kubelet[2458]: I0209 18:34:12.139956 2458 topology_manager.go:215] "Topology Admit Handler" podUID="2a693e6a-b889-4fae-a8cb-0526629176fc" podNamespace="kube-system" podName="kube-proxy-zzr9q" Feb 9 18:34:12.145097 systemd[1]: Created slice kubepods-besteffort-pod2a693e6a_b889_4fae_a8cb_0526629176fc.slice. Feb 9 18:34:12.331110 kubelet[2458]: I0209 18:34:12.331072 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2a693e6a-b889-4fae-a8cb-0526629176fc-kube-proxy\") pod \"kube-proxy-zzr9q\" (UID: \"2a693e6a-b889-4fae-a8cb-0526629176fc\") " pod="kube-system/kube-proxy-zzr9q" Feb 9 18:34:12.331265 kubelet[2458]: I0209 18:34:12.331124 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2a693e6a-b889-4fae-a8cb-0526629176fc-xtables-lock\") pod \"kube-proxy-zzr9q\" (UID: \"2a693e6a-b889-4fae-a8cb-0526629176fc\") " pod="kube-system/kube-proxy-zzr9q" Feb 9 18:34:12.331265 kubelet[2458]: I0209 18:34:12.331147 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5jbds\" (UniqueName: \"kubernetes.io/projected/2a693e6a-b889-4fae-a8cb-0526629176fc-kube-api-access-5jbds\") pod \"kube-proxy-zzr9q\" (UID: \"2a693e6a-b889-4fae-a8cb-0526629176fc\") " pod="kube-system/kube-proxy-zzr9q" Feb 9 18:34:12.331265 kubelet[2458]: I0209 18:34:12.331169 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2a693e6a-b889-4fae-a8cb-0526629176fc-lib-modules\") pod \"kube-proxy-zzr9q\" (UID: \"2a693e6a-b889-4fae-a8cb-0526629176fc\") " pod="kube-system/kube-proxy-zzr9q" Feb 9 18:34:12.452404 env[1356]: time="2024-02-09T18:34:12.451656381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zzr9q,Uid:2a693e6a-b889-4fae-a8cb-0526629176fc,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:12.488984 env[1356]: time="2024-02-09T18:34:12.487623376Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:12.488984 env[1356]: time="2024-02-09T18:34:12.487669926Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:12.488984 env[1356]: time="2024-02-09T18:34:12.487680123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:12.488984 env[1356]: time="2024-02-09T18:34:12.487782460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66 pid=2540 runtime=io.containerd.runc.v2 Feb 9 18:34:12.512353 systemd[1]: run-containerd-runc-k8s.io-baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66-runc.tlUOOe.mount: Deactivated successfully. Feb 9 18:34:12.518239 systemd[1]: Started cri-containerd-baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66.scope. Feb 9 18:34:12.531743 kubelet[2458]: I0209 18:34:12.531106 2458 topology_manager.go:215] "Topology Admit Handler" podUID="d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-z4mg2" Feb 9 18:34:12.536400 systemd[1]: Created slice kubepods-besteffort-podd0c7bcbf_f64d_4e55_b2bf_6ca40dadf6a2.slice. Feb 9 18:34:12.552701 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 18:34:12.552822 kernel: audit: type=1400 audit(1707503652.545:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.592297 kernel: audit: type=1400 audit(1707503652.545:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.615144 kernel: audit: type=1400 audit(1707503652.545:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.615310 kernel: audit: type=1400 audit(1707503652.545:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.636389 kubelet[2458]: I0209 18:34:12.636350 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2-var-lib-calico\") pod \"tigera-operator-55585899bf-z4mg2\" (UID: \"d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2\") " pod="tigera-operator/tigera-operator-55585899bf-z4mg2" Feb 9 18:34:12.636587 kubelet[2458]: I0209 18:34:12.636576 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nqlps\" (UniqueName: \"kubernetes.io/projected/d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2-kube-api-access-nqlps\") pod \"tigera-operator-55585899bf-z4mg2\" (UID: \"d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2\") " pod="tigera-operator/tigera-operator-55585899bf-z4mg2" Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.657681 kernel: audit: type=1400 audit(1707503652.545:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.680118 kernel: audit: type=1400 audit(1707503652.545:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.702076 kernel: audit: type=1400 audit(1707503652.545:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.723302 kernel: audit: type=1400 audit(1707503652.545:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.744116 kernel: audit: type=1400 audit(1707503652.545:929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.747498 env[1356]: time="2024-02-09T18:34:12.747451514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zzr9q,Uid:2a693e6a-b889-4fae-a8cb-0526629176fc,Namespace:kube-system,Attempt:0,} returns sandbox id \"baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66\"" Feb 9 18:34:12.753891 env[1356]: time="2024-02-09T18:34:12.753839864Z" level=info msg="CreateContainer within sandbox \"baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:34:12.764934 kernel: audit: type=1400 audit(1707503652.551:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.551000 audit: BPF prog-id=110 op=LOAD Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2540 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261663165636138616238653837376461383465656333333765353962 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2540 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261663165636138616238653837376461383465656333333765353962 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit: BPF prog-id=111 op=LOAD Feb 9 18:34:12.571000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2540 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261663165636138616238653837376461383465656333333765353962 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit: BPF prog-id=112 op=LOAD Feb 9 18:34:12.571000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2540 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261663165636138616238653837376461383465656333333765353962 Feb 9 18:34:12.571000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:34:12.571000 audit: BPF prog-id=111 op=UNLOAD Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.571000 audit: BPF prog-id=113 op=LOAD Feb 9 18:34:12.571000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2540 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261663165636138616238653837376461383465656333333765353962 Feb 9 18:34:12.805489 env[1356]: time="2024-02-09T18:34:12.805441590Z" level=info msg="CreateContainer within sandbox \"baf1eca8ab8e877da84eec337e59b97fb0f94da9e997b1cb7c77548b96e9ac66\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0838a82b2ed5afa5108219a3a2c51b5f8bdafab09eccf696f6a83e7f5a34e207\"" Feb 9 18:34:12.806383 env[1356]: time="2024-02-09T18:34:12.806353663Z" level=info msg="StartContainer for \"0838a82b2ed5afa5108219a3a2c51b5f8bdafab09eccf696f6a83e7f5a34e207\"" Feb 9 18:34:12.827631 systemd[1]: Started cri-containerd-0838a82b2ed5afa5108219a3a2c51b5f8bdafab09eccf696f6a83e7f5a34e207.scope. Feb 9 18:34:12.843921 env[1356]: time="2024-02-09T18:34:12.843874106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-z4mg2,Uid:d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2,Namespace:tigera-operator,Attempt:0,}" Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2540 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333861383262326564356166613531303832313961336132633531 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit: BPF prog-id=114 op=LOAD Feb 9 18:34:12.847000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2540 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333861383262326564356166613531303832313961336132633531 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit: BPF prog-id=115 op=LOAD Feb 9 18:34:12.847000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2540 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333861383262326564356166613531303832313961336132633531 Feb 9 18:34:12.847000 audit: BPF prog-id=115 op=UNLOAD Feb 9 18:34:12.847000 audit: BPF prog-id=114 op=UNLOAD Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.847000 audit: BPF prog-id=116 op=LOAD Feb 9 18:34:12.847000 audit[2582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2540 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333861383262326564356166613531303832313961336132633531 Feb 9 18:34:12.876045 env[1356]: time="2024-02-09T18:34:12.875991655Z" level=info msg="StartContainer for \"0838a82b2ed5afa5108219a3a2c51b5f8bdafab09eccf696f6a83e7f5a34e207\" returns successfully" Feb 9 18:34:12.891507 env[1356]: time="2024-02-09T18:34:12.891384241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:12.891981 env[1356]: time="2024-02-09T18:34:12.891843857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:12.892190 env[1356]: time="2024-02-09T18:34:12.892140150Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:12.892594 env[1356]: time="2024-02-09T18:34:12.892527462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582 pid=2617 runtime=io.containerd.runc.v2 Feb 9 18:34:12.907988 systemd[1]: Started cri-containerd-bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582.scope. Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit: BPF prog-id=117 op=LOAD Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264323136396632393033326332616439373338666366336236623231 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264323136396632393033326332616439373338666366336236623231 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit: BPF prog-id=118 op=LOAD Feb 9 18:34:12.921000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264323136396632393033326332616439373338666366336236623231 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.921000 audit: BPF prog-id=119 op=LOAD Feb 9 18:34:12.921000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264323136396632393033326332616439373338666366336236623231 Feb 9 18:34:12.921000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:34:12.921000 audit: BPF prog-id=118 op=UNLOAD Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:12.922000 audit: BPF prog-id=120 op=LOAD Feb 9 18:34:12.922000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264323136396632393033326332616439373338666366336236623231 Feb 9 18:34:12.948291 env[1356]: time="2024-02-09T18:34:12.948236935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-z4mg2,Uid:d0c7bcbf-f64d-4e55-b2bf-6ca40dadf6a2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582\"" Feb 9 18:34:12.950347 env[1356]: time="2024-02-09T18:34:12.950303586Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 18:34:12.972000 audit[2673]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:12.972000 audit[2673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc61196c0 a2=0 a3=ffff9f75f6c0 items=0 ppid=2593 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:34:12.975000 audit[2674]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:12.975000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3fae4e0 a2=0 a3=ffffad7f66c0 items=0 ppid=2593 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:34:12.977000 audit[2675]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:12.977000 audit[2675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd487440 a2=0 a3=ffffaf6796c0 items=0 ppid=2593 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:34:12.979000 audit[2676]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:12.979000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff30b70a0 a2=0 a3=ffffbae1a6c0 items=0 ppid=2593 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:34:12.979000 audit[2677]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:12.979000 audit[2677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffe645f10 a2=0 a3=ffffaeec56c0 items=0 ppid=2593 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:34:12.980000 audit[2680]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:12.980000 audit[2680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb353d40 a2=0 a3=ffff839ca6c0 items=0 ppid=2593 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:12.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:34:13.072000 audit[2681]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.072000 audit[2681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff8a50920 a2=0 a3=ffffad2c86c0 items=0 ppid=2593 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:34:13.074000 audit[2683]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.074000 audit[2683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd9103f40 a2=0 a3=ffffb9efb6c0 items=0 ppid=2593 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:34:13.079000 audit[2686]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.079000 audit[2686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffbbdf3c0 a2=0 a3=ffff9b5686c0 items=0 ppid=2593 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:34:13.080000 audit[2687]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.080000 audit[2687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd7fd5d0 a2=0 a3=ffff8d7996c0 items=0 ppid=2593 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:34:13.084000 audit[2689]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.084000 audit[2689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff2303d90 a2=0 a3=ffff8df656c0 items=0 ppid=2593 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:34:13.085000 audit[2690]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.085000 audit[2690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd4cd170 a2=0 a3=ffffaa5786c0 items=0 ppid=2593 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:34:13.089000 audit[2692]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.089000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcd240880 a2=0 a3=ffffaa3466c0 items=0 ppid=2593 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:34:13.093000 audit[2695]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.093000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd6aa2350 a2=0 a3=ffff96e766c0 items=0 ppid=2593 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:34:13.095000 audit[2696]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.095000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0fe1b40 a2=0 a3=ffff8f7726c0 items=0 ppid=2593 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:34:13.097000 audit[2698]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.097000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5cb6260 a2=0 a3=ffffadc2c6c0 items=0 ppid=2593 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:34:13.099000 audit[2699]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.099000 audit[2699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8977d80 a2=0 a3=ffff90ab06c0 items=0 ppid=2593 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:34:13.101000 audit[2701]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.101000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc2d7160 a2=0 a3=ffffa4eda6c0 items=0 ppid=2593 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:13.105000 audit[2704]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.105000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5be87f0 a2=0 a3=ffffada1b6c0 items=0 ppid=2593 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:13.110000 audit[2707]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.110000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe942450 a2=0 a3=ffffa95f86c0 items=0 ppid=2593 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:34:13.111000 audit[2708]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.111000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc5b99890 a2=0 a3=ffffbb5aa6c0 items=0 ppid=2593 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:34:13.115000 audit[2710]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.115000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffec162c20 a2=0 a3=ffff9d5176c0 items=0 ppid=2593 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:13.118000 audit[2713]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.118000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef8d35a0 a2=0 a3=ffffa95f86c0 items=0 ppid=2593 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:13.120000 audit[2714]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.120000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe915dc90 a2=0 a3=ffffa53736c0 items=0 ppid=2593 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:34:13.122000 audit[2716]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:34:13.122000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdc5596d0 a2=0 a3=ffffb961f6c0 items=0 ppid=2593 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:34:13.226000 audit[2722]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:13.226000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe042e880 a2=0 a3=ffff93e1d6c0 items=0 ppid=2593 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:13.282000 audit[2722]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:13.282000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe042e880 a2=0 a3=ffff93e1d6c0 items=0 ppid=2593 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:13.287000 audit[2728]: NETFILTER_CFG table=filter:68 family=2 entries=14 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:13.287000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff234fcc0 a2=0 a3=ffff7ffa26c0 items=0 ppid=2593 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:13.288000 audit[2728]: NETFILTER_CFG table=nat:69 family=2 entries=12 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:13.288000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff234fcc0 a2=0 a3=ffff7ffa26c0 items=0 ppid=2593 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:13.296000 audit[2729]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.296000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff5c14710 a2=0 a3=ffff96f2c6c0 items=0 ppid=2593 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:34:13.299000 audit[2731]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.299000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffddff0040 a2=0 a3=ffffacf8c6c0 items=0 ppid=2593 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:34:13.303000 audit[2734]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.303000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffed0600d0 a2=0 a3=ffffa680b6c0 items=0 ppid=2593 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:34:13.305000 audit[2735]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.305000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1fa7f90 a2=0 a3=ffff82e486c0 items=0 ppid=2593 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:34:13.307000 audit[2737]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.307000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd7bbd980 a2=0 a3=ffff85d826c0 items=0 ppid=2593 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:34:13.308000 audit[2738]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.308000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff230be00 a2=0 a3=ffff9deb86c0 items=0 ppid=2593 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:34:13.311000 audit[2740]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.311000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffccbbc240 a2=0 a3=ffff802276c0 items=0 ppid=2593 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:34:13.315000 audit[2743]: NETFILTER_CFG table=filter:77 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.315000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffced2fd50 a2=0 a3=ffff99b116c0 items=0 ppid=2593 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:34:13.317000 audit[2744]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.317000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc198ca70 a2=0 a3=ffff8db496c0 items=0 ppid=2593 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:34:13.319000 audit[2746]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.319000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb087920 a2=0 a3=ffffba20f6c0 items=0 ppid=2593 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:34:13.320000 audit[2747]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.320000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3218dc0 a2=0 a3=ffff9a1416c0 items=0 ppid=2593 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:34:13.323000 audit[2749]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.323000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc1954fe0 a2=0 a3=ffff9f7a26c0 items=0 ppid=2593 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:34:13.326000 audit[2752]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.326000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce3e9cf0 a2=0 a3=ffffb92836c0 items=0 ppid=2593 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:34:13.330000 audit[2755]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.330000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff486aaf0 a2=0 a3=ffff9ce326c0 items=0 ppid=2593 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:34:13.331000 audit[2756]: NETFILTER_CFG table=nat:84 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.331000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0b9c0b0 a2=0 a3=ffffbc07d6c0 items=0 ppid=2593 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:34:13.333000 audit[2758]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.333000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe043020 a2=0 a3=ffff9e5ab6c0 items=0 ppid=2593 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:13.336000 audit[2761]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.336000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff2a25c60 a2=0 a3=ffff9496e6c0 items=0 ppid=2593 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:34:13.337000 audit[2762]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.337000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff564ab0 a2=0 a3=ffffbe4186c0 items=0 ppid=2593 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:34:13.339000 audit[2764]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.339000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff776e870 a2=0 a3=ffff98e496c0 items=0 ppid=2593 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:34:13.341000 audit[2765]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.341000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb8e6e00 a2=0 a3=ffff8997f6c0 items=0 ppid=2593 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:34:13.343000 audit[2767]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.343000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd1c91a30 a2=0 a3=ffffafbed6c0 items=0 ppid=2593 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:13.346000 audit[2770]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:34:13.346000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc2deae30 a2=0 a3=ffff88dd16c0 items=0 ppid=2593 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:34:13.349000 audit[2772]: NETFILTER_CFG table=filter:92 family=10 entries=3 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:34:13.349000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc97bba90 a2=0 a3=ffffa43956c0 items=0 ppid=2593 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.349000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:13.349000 audit[2772]: NETFILTER_CFG table=nat:93 family=10 entries=7 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:34:13.349000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc97bba90 a2=0 a3=ffffa43956c0 items=0 ppid=2593 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:13.349000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:15.056547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2858620647.mount: Deactivated successfully. Feb 9 18:34:16.088863 env[1356]: time="2024-02-09T18:34:16.088813105Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.094727 env[1356]: time="2024-02-09T18:34:16.094683476Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.098844 env[1356]: time="2024-02-09T18:34:16.098786938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.103837 env[1356]: time="2024-02-09T18:34:16.103776814Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:16.104415 env[1356]: time="2024-02-09T18:34:16.104386966Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 18:34:16.109039 env[1356]: time="2024-02-09T18:34:16.109000281Z" level=info msg="CreateContainer within sandbox \"bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 18:34:16.134849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3027657081.mount: Deactivated successfully. Feb 9 18:34:16.141733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3059096162.mount: Deactivated successfully. Feb 9 18:34:16.153161 env[1356]: time="2024-02-09T18:34:16.153095576Z" level=info msg="CreateContainer within sandbox \"bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5\"" Feb 9 18:34:16.154801 env[1356]: time="2024-02-09T18:34:16.154413620Z" level=info msg="StartContainer for \"50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5\"" Feb 9 18:34:16.176426 systemd[1]: Started cri-containerd-50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5.scope. Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.190000 audit: BPF prog-id=121 op=LOAD Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2617 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:16.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623737346634663039366633326637336632636335653939333165 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2617 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:16.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623737346634663039366633326637336632636335653939333165 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit: BPF prog-id=122 op=LOAD Feb 9 18:34:16.191000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2617 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:16.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623737346634663039366633326637336632636335653939333165 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit: BPF prog-id=123 op=LOAD Feb 9 18:34:16.191000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2617 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:16.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623737346634663039366633326637336632636335653939333165 Feb 9 18:34:16.191000 audit: BPF prog-id=123 op=UNLOAD Feb 9 18:34:16.191000 audit: BPF prog-id=122 op=UNLOAD Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:16.191000 audit: BPF prog-id=124 op=LOAD Feb 9 18:34:16.191000 audit[2780]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2617 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:16.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623737346634663039366633326637336632636335653939333165 Feb 9 18:34:16.213953 env[1356]: time="2024-02-09T18:34:16.213899056Z" level=info msg="StartContainer for \"50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5\" returns successfully" Feb 9 18:34:16.450368 kubelet[2458]: I0209 18:34:16.450266 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-zzr9q" podStartSLOduration=4.450225574 podCreationTimestamp="2024-02-09 18:34:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:13.441411596 +0000 UTC m=+14.197730356" watchObservedRunningTime="2024-02-09 18:34:16.450225574 +0000 UTC m=+17.206544374" Feb 9 18:34:18.537000 audit[2812]: NETFILTER_CFG table=filter:94 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.547223 kernel: kauditd_printk_skb: 363 callbacks suppressed Feb 9 18:34:18.547360 kernel: audit: type=1325 audit(1707503658.537:1034): table=filter:94 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.537000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffe322a60 a2=0 a3=ffff8aade6c0 items=0 ppid=2593 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.603029 kernel: audit: type=1300 audit(1707503658.537:1034): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffe322a60 a2=0 a3=ffff8aade6c0 items=0 ppid=2593 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.623292 kernel: audit: type=1327 audit(1707503658.537:1034): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.538000 audit[2812]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.642209 kernel: audit: type=1325 audit(1707503658.538:1035): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.538000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffe322a60 a2=0 a3=ffff8aade6c0 items=0 ppid=2593 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.679727 kernel: audit: type=1300 audit(1707503658.538:1035): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffe322a60 a2=0 a3=ffff8aade6c0 items=0 ppid=2593 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.699132 kernel: audit: type=1327 audit(1707503658.538:1035): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.646000 audit[2814]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.716893 kernel: audit: type=1325 audit(1707503658.646:1036): table=filter:96 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.719250 kernel: audit: type=1300 audit(1707503658.646:1036): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff4a49f70 a2=0 a3=ffffaedbb6c0 items=0 ppid=2593 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.646000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff4a49f70 a2=0 a3=ffffaedbb6c0 items=0 ppid=2593 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.770862 kernel: audit: type=1327 audit(1707503658.646:1036): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.679000 audit[2814]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.793576 kernel: audit: type=1325 audit(1707503658.679:1037): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:18.679000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff4a49f70 a2=0 a3=ffffaedbb6c0 items=0 ppid=2593 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:18.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:18.797316 kubelet[2458]: I0209 18:34:18.797272 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-z4mg2" podStartSLOduration=3.642093157 podCreationTimestamp="2024-02-09 18:34:12 +0000 UTC" firstStartedPulling="2024-02-09 18:34:12.949651174 +0000 UTC m=+13.705969974" lastFinishedPulling="2024-02-09 18:34:16.104792042 +0000 UTC m=+16.861110842" observedRunningTime="2024-02-09 18:34:16.453278296 +0000 UTC m=+17.209597096" watchObservedRunningTime="2024-02-09 18:34:18.797234025 +0000 UTC m=+19.553552825" Feb 9 18:34:18.797715 kubelet[2458]: I0209 18:34:18.797394 2458 topology_manager.go:215] "Topology Admit Handler" podUID="f2fa66fc-1e57-4972-a77e-4b30b4fa6e96" podNamespace="calico-system" podName="calico-typha-5675fcc9f8-6q59p" Feb 9 18:34:18.802972 systemd[1]: Created slice kubepods-besteffort-podf2fa66fc_1e57_4972_a77e_4b30b4fa6e96.slice. Feb 9 18:34:18.872739 kubelet[2458]: I0209 18:34:18.872697 2458 topology_manager.go:215] "Topology Admit Handler" podUID="59b5363e-cbbb-481b-82f8-412a9688f7f7" podNamespace="calico-system" podName="calico-node-l5mjm" Feb 9 18:34:18.877659 systemd[1]: Created slice kubepods-besteffort-pod59b5363e_cbbb_481b_82f8_412a9688f7f7.slice. Feb 9 18:34:18.904592 kubelet[2458]: I0209 18:34:18.904556 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-var-run-calico\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.904814 kubelet[2458]: I0209 18:34:18.904799 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-cni-bin-dir\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.904946 kubelet[2458]: I0209 18:34:18.904934 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f2fa66fc-1e57-4972-a77e-4b30b4fa6e96-tigera-ca-bundle\") pod \"calico-typha-5675fcc9f8-6q59p\" (UID: \"f2fa66fc-1e57-4972-a77e-4b30b4fa6e96\") " pod="calico-system/calico-typha-5675fcc9f8-6q59p" Feb 9 18:34:18.905056 kubelet[2458]: I0209 18:34:18.905043 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-lib-modules\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905191 kubelet[2458]: I0209 18:34:18.905146 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/59b5363e-cbbb-481b-82f8-412a9688f7f7-tigera-ca-bundle\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905268 kubelet[2458]: I0209 18:34:18.905233 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-cni-net-dir\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905268 kubelet[2458]: I0209 18:34:18.905267 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-xtables-lock\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905326 kubelet[2458]: I0209 18:34:18.905307 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/59b5363e-cbbb-481b-82f8-412a9688f7f7-node-certs\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905356 kubelet[2458]: I0209 18:34:18.905336 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-flexvol-driver-host\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905378 kubelet[2458]: I0209 18:34:18.905356 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kkffp\" (UniqueName: \"kubernetes.io/projected/59b5363e-cbbb-481b-82f8-412a9688f7f7-kube-api-access-kkffp\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905404 kubelet[2458]: I0209 18:34:18.905391 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f2fa66fc-1e57-4972-a77e-4b30b4fa6e96-typha-certs\") pod \"calico-typha-5675fcc9f8-6q59p\" (UID: \"f2fa66fc-1e57-4972-a77e-4b30b4fa6e96\") " pod="calico-system/calico-typha-5675fcc9f8-6q59p" Feb 9 18:34:18.905453 kubelet[2458]: I0209 18:34:18.905435 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-policysync\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905542 kubelet[2458]: I0209 18:34:18.905475 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-var-lib-calico\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:18.905542 kubelet[2458]: I0209 18:34:18.905499 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8m95\" (UniqueName: \"kubernetes.io/projected/f2fa66fc-1e57-4972-a77e-4b30b4fa6e96-kube-api-access-m8m95\") pod \"calico-typha-5675fcc9f8-6q59p\" (UID: \"f2fa66fc-1e57-4972-a77e-4b30b4fa6e96\") " pod="calico-system/calico-typha-5675fcc9f8-6q59p" Feb 9 18:34:18.905542 kubelet[2458]: I0209 18:34:18.905519 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/59b5363e-cbbb-481b-82f8-412a9688f7f7-cni-log-dir\") pod \"calico-node-l5mjm\" (UID: \"59b5363e-cbbb-481b-82f8-412a9688f7f7\") " pod="calico-system/calico-node-l5mjm" Feb 9 18:34:19.006577 kubelet[2458]: I0209 18:34:19.006524 2458 topology_manager.go:215] "Topology Admit Handler" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" podNamespace="calico-system" podName="csi-node-driver-llbv6" Feb 9 18:34:19.006854 kubelet[2458]: E0209 18:34:19.006823 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:19.022312 kubelet[2458]: E0209 18:34:19.020368 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.022312 kubelet[2458]: W0209 18:34:19.020397 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.022312 kubelet[2458]: E0209 18:34:19.020432 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.025857 kubelet[2458]: E0209 18:34:19.025825 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.025857 kubelet[2458]: W0209 18:34:19.025850 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.026039 kubelet[2458]: E0209 18:34:19.025886 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.026815 kubelet[2458]: E0209 18:34:19.026795 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.026815 kubelet[2458]: W0209 18:34:19.026809 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.026921 kubelet[2458]: E0209 18:34:19.026828 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.044128 kubelet[2458]: E0209 18:34:19.044035 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.044128 kubelet[2458]: W0209 18:34:19.044055 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.044128 kubelet[2458]: E0209 18:34:19.044075 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.058890 kubelet[2458]: E0209 18:34:19.058865 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.059037 kubelet[2458]: W0209 18:34:19.059019 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.059139 kubelet[2458]: E0209 18:34:19.059128 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.080573 kubelet[2458]: E0209 18:34:19.080542 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.080573 kubelet[2458]: W0209 18:34:19.080564 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.080761 kubelet[2458]: E0209 18:34:19.080588 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.080761 kubelet[2458]: E0209 18:34:19.080737 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.080761 kubelet[2458]: W0209 18:34:19.080745 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.080761 kubelet[2458]: E0209 18:34:19.080756 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.081273 kubelet[2458]: E0209 18:34:19.081255 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.081273 kubelet[2458]: W0209 18:34:19.081270 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.081374 kubelet[2458]: E0209 18:34:19.081283 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.081462 kubelet[2458]: E0209 18:34:19.081448 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.081462 kubelet[2458]: W0209 18:34:19.081461 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.081532 kubelet[2458]: E0209 18:34:19.081472 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.081691 kubelet[2458]: E0209 18:34:19.081675 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.081691 kubelet[2458]: W0209 18:34:19.081690 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.081782 kubelet[2458]: E0209 18:34:19.081702 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.081866 kubelet[2458]: E0209 18:34:19.081843 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.081866 kubelet[2458]: W0209 18:34:19.081859 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.081937 kubelet[2458]: E0209 18:34:19.081869 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.082109 kubelet[2458]: E0209 18:34:19.082082 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.082109 kubelet[2458]: W0209 18:34:19.082101 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.082197 kubelet[2458]: E0209 18:34:19.082113 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.082290 kubelet[2458]: E0209 18:34:19.082271 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.082290 kubelet[2458]: W0209 18:34:19.082285 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.082360 kubelet[2458]: E0209 18:34:19.082296 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.082970 kubelet[2458]: E0209 18:34:19.082948 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.082970 kubelet[2458]: W0209 18:34:19.082964 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.083084 kubelet[2458]: E0209 18:34:19.082978 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.083165 kubelet[2458]: E0209 18:34:19.083149 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.083165 kubelet[2458]: W0209 18:34:19.083161 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.083251 kubelet[2458]: E0209 18:34:19.083172 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.083416 kubelet[2458]: E0209 18:34:19.083398 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.083416 kubelet[2458]: W0209 18:34:19.083413 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.083511 kubelet[2458]: E0209 18:34:19.083425 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.083592 kubelet[2458]: E0209 18:34:19.083575 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.083592 kubelet[2458]: W0209 18:34:19.083587 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.083700 kubelet[2458]: E0209 18:34:19.083599 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.083883 kubelet[2458]: E0209 18:34:19.083864 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.083883 kubelet[2458]: W0209 18:34:19.083879 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.083883 kubelet[2458]: E0209 18:34:19.083892 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.084086 kubelet[2458]: E0209 18:34:19.084038 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.084086 kubelet[2458]: W0209 18:34:19.084049 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.084086 kubelet[2458]: E0209 18:34:19.084060 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.084337 kubelet[2458]: E0209 18:34:19.084319 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.084337 kubelet[2458]: W0209 18:34:19.084333 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.084437 kubelet[2458]: E0209 18:34:19.084345 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.085628 kubelet[2458]: E0209 18:34:19.084481 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.085628 kubelet[2458]: W0209 18:34:19.084494 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.085628 kubelet[2458]: E0209 18:34:19.084504 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.085988 kubelet[2458]: E0209 18:34:19.085967 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.085988 kubelet[2458]: W0209 18:34:19.085981 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.086087 kubelet[2458]: E0209 18:34:19.085995 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.086294 kubelet[2458]: E0209 18:34:19.086267 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.086294 kubelet[2458]: W0209 18:34:19.086280 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.086294 kubelet[2458]: E0209 18:34:19.086292 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.086557 kubelet[2458]: E0209 18:34:19.086541 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.086557 kubelet[2458]: W0209 18:34:19.086554 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.086655 kubelet[2458]: E0209 18:34:19.086569 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.086727 kubelet[2458]: E0209 18:34:19.086713 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.086727 kubelet[2458]: W0209 18:34:19.086724 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.086796 kubelet[2458]: E0209 18:34:19.086735 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.105507 env[1356]: time="2024-02-09T18:34:19.105459916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5675fcc9f8-6q59p,Uid:f2fa66fc-1e57-4972-a77e-4b30b4fa6e96,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:19.110301 kubelet[2458]: E0209 18:34:19.110265 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.110301 kubelet[2458]: W0209 18:34:19.110288 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.110493 kubelet[2458]: E0209 18:34:19.110313 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.110493 kubelet[2458]: I0209 18:34:19.110347 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f9fsl\" (UniqueName: \"kubernetes.io/projected/04ff6cb3-572d-43b5-899a-f3fe2cdb4af9-kube-api-access-f9fsl\") pod \"csi-node-driver-llbv6\" (UID: \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\") " pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:19.110545 kubelet[2458]: E0209 18:34:19.110537 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.110570 kubelet[2458]: W0209 18:34:19.110546 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.110570 kubelet[2458]: E0209 18:34:19.110558 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.110621 kubelet[2458]: I0209 18:34:19.110577 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/04ff6cb3-572d-43b5-899a-f3fe2cdb4af9-varrun\") pod \"csi-node-driver-llbv6\" (UID: \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\") " pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:19.110824 kubelet[2458]: E0209 18:34:19.110802 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.110824 kubelet[2458]: W0209 18:34:19.110816 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.110925 kubelet[2458]: E0209 18:34:19.110834 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.110925 kubelet[2458]: I0209 18:34:19.110853 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/04ff6cb3-572d-43b5-899a-f3fe2cdb4af9-kubelet-dir\") pod \"csi-node-driver-llbv6\" (UID: \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\") " pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:19.111017 kubelet[2458]: E0209 18:34:19.110999 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.111017 kubelet[2458]: W0209 18:34:19.111012 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.111078 kubelet[2458]: E0209 18:34:19.111024 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.111078 kubelet[2458]: I0209 18:34:19.111042 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/04ff6cb3-572d-43b5-899a-f3fe2cdb4af9-socket-dir\") pod \"csi-node-driver-llbv6\" (UID: \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\") " pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:19.111279 kubelet[2458]: E0209 18:34:19.111263 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.111279 kubelet[2458]: W0209 18:34:19.111275 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.111371 kubelet[2458]: E0209 18:34:19.111292 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.111446 kubelet[2458]: I0209 18:34:19.111426 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/04ff6cb3-572d-43b5-899a-f3fe2cdb4af9-registration-dir\") pod \"csi-node-driver-llbv6\" (UID: \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\") " pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:19.111760 kubelet[2458]: E0209 18:34:19.111745 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.111857 kubelet[2458]: W0209 18:34:19.111845 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.111952 kubelet[2458]: E0209 18:34:19.111940 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.112258 kubelet[2458]: E0209 18:34:19.112242 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.112382 kubelet[2458]: W0209 18:34:19.112366 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.112481 kubelet[2458]: E0209 18:34:19.112471 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.112770 kubelet[2458]: E0209 18:34:19.112648 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.112770 kubelet[2458]: W0209 18:34:19.112661 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.112770 kubelet[2458]: E0209 18:34:19.112679 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.113084 kubelet[2458]: E0209 18:34:19.113062 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.113084 kubelet[2458]: W0209 18:34:19.113080 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.113252 kubelet[2458]: E0209 18:34:19.113238 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.113316 kubelet[2458]: E0209 18:34:19.113261 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.113383 kubelet[2458]: W0209 18:34:19.113372 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.113555 kubelet[2458]: E0209 18:34:19.113542 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.113736 kubelet[2458]: E0209 18:34:19.113723 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.113833 kubelet[2458]: W0209 18:34:19.113804 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.113958 kubelet[2458]: E0209 18:34:19.113934 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.114903 kubelet[2458]: E0209 18:34:19.114883 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.115028 kubelet[2458]: W0209 18:34:19.115013 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.115141 kubelet[2458]: E0209 18:34:19.115119 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.115890 kubelet[2458]: E0209 18:34:19.115871 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.115992 kubelet[2458]: W0209 18:34:19.115978 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.116076 kubelet[2458]: E0209 18:34:19.116066 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.117219 kubelet[2458]: E0209 18:34:19.117191 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.117334 kubelet[2458]: W0209 18:34:19.117320 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.117410 kubelet[2458]: E0209 18:34:19.117400 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.117961 kubelet[2458]: E0209 18:34:19.117946 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.118055 kubelet[2458]: W0209 18:34:19.118044 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.118116 kubelet[2458]: E0209 18:34:19.118107 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.180715 env[1356]: time="2024-02-09T18:34:19.180450122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l5mjm,Uid:59b5363e-cbbb-481b-82f8-412a9688f7f7,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:19.212974 kubelet[2458]: E0209 18:34:19.212940 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.212974 kubelet[2458]: W0209 18:34:19.212964 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.212974 kubelet[2458]: E0209 18:34:19.212986 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.213385 kubelet[2458]: E0209 18:34:19.213365 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.213385 kubelet[2458]: W0209 18:34:19.213380 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.213482 kubelet[2458]: E0209 18:34:19.213398 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.213613 kubelet[2458]: E0209 18:34:19.213588 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.213613 kubelet[2458]: W0209 18:34:19.213604 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.213613 kubelet[2458]: E0209 18:34:19.213621 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.213905 kubelet[2458]: E0209 18:34:19.213888 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.213905 kubelet[2458]: W0209 18:34:19.213901 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.213993 kubelet[2458]: E0209 18:34:19.213916 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.214135 kubelet[2458]: E0209 18:34:19.214112 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.214135 kubelet[2458]: W0209 18:34:19.214127 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.214228 kubelet[2458]: E0209 18:34:19.214147 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.214417 kubelet[2458]: E0209 18:34:19.214393 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.214417 kubelet[2458]: W0209 18:34:19.214409 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.214538 kubelet[2458]: E0209 18:34:19.214524 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.214657 kubelet[2458]: E0209 18:34:19.214544 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.214724 kubelet[2458]: W0209 18:34:19.214712 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.214809 kubelet[2458]: E0209 18:34:19.214788 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.216063 kubelet[2458]: E0209 18:34:19.216043 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.216175 kubelet[2458]: W0209 18:34:19.216160 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.216368 kubelet[2458]: E0209 18:34:19.216347 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.216585 kubelet[2458]: E0209 18:34:19.216570 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.216687 kubelet[2458]: W0209 18:34:19.216673 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.216884 kubelet[2458]: E0209 18:34:19.216858 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.217029 kubelet[2458]: E0209 18:34:19.217017 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.217113 kubelet[2458]: W0209 18:34:19.217101 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.217318 kubelet[2458]: E0209 18:34:19.217198 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.217522 kubelet[2458]: E0209 18:34:19.217509 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.217615 kubelet[2458]: W0209 18:34:19.217602 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.217750 kubelet[2458]: E0209 18:34:19.217712 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.217969 kubelet[2458]: E0209 18:34:19.217954 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.218068 kubelet[2458]: W0209 18:34:19.218054 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.218190 kubelet[2458]: E0209 18:34:19.218158 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.218448 kubelet[2458]: E0209 18:34:19.218436 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.218545 kubelet[2458]: W0209 18:34:19.218531 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.218742 kubelet[2458]: E0209 18:34:19.218693 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.218871 kubelet[2458]: E0209 18:34:19.218858 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.218954 kubelet[2458]: W0209 18:34:19.218942 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.219104 kubelet[2458]: E0209 18:34:19.219082 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.219351 kubelet[2458]: E0209 18:34:19.219326 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.219436 kubelet[2458]: W0209 18:34:19.219409 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.219594 kubelet[2458]: E0209 18:34:19.219569 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.220350 kubelet[2458]: E0209 18:34:19.220326 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.220452 kubelet[2458]: W0209 18:34:19.220438 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.220578 kubelet[2458]: E0209 18:34:19.220556 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.220831 kubelet[2458]: E0209 18:34:19.220817 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.220930 kubelet[2458]: W0209 18:34:19.220916 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.221125 kubelet[2458]: E0209 18:34:19.221098 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.221345 kubelet[2458]: E0209 18:34:19.221330 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.221461 kubelet[2458]: W0209 18:34:19.221445 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.221624 kubelet[2458]: E0209 18:34:19.221552 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.222063 kubelet[2458]: E0209 18:34:19.222035 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.222167 kubelet[2458]: W0209 18:34:19.222151 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.222302 kubelet[2458]: E0209 18:34:19.222269 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.222567 kubelet[2458]: E0209 18:34:19.222552 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.222656 kubelet[2458]: W0209 18:34:19.222643 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.222780 kubelet[2458]: E0209 18:34:19.222758 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.223051 kubelet[2458]: E0209 18:34:19.223038 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.223155 kubelet[2458]: W0209 18:34:19.223125 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.223380 kubelet[2458]: E0209 18:34:19.223356 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.225261 kubelet[2458]: E0209 18:34:19.224332 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.225261 kubelet[2458]: W0209 18:34:19.224355 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.225261 kubelet[2458]: E0209 18:34:19.224548 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.225567 kubelet[2458]: E0209 18:34:19.225540 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.225625 kubelet[2458]: W0209 18:34:19.225572 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.225675 kubelet[2458]: E0209 18:34:19.225658 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.225874 kubelet[2458]: E0209 18:34:19.225857 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.225874 kubelet[2458]: W0209 18:34:19.225869 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.225949 kubelet[2458]: E0209 18:34:19.225908 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.226159 kubelet[2458]: E0209 18:34:19.226124 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.226159 kubelet[2458]: W0209 18:34:19.226153 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.226267 kubelet[2458]: E0209 18:34:19.226166 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.244326 kubelet[2458]: E0209 18:34:19.244291 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:19.244326 kubelet[2458]: W0209 18:34:19.244316 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:19.244504 kubelet[2458]: E0209 18:34:19.244338 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:19.261664 env[1356]: time="2024-02-09T18:34:19.261583957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:19.261853 env[1356]: time="2024-02-09T18:34:19.261820351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:19.261991 env[1356]: time="2024-02-09T18:34:19.261969681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:19.263276 env[1356]: time="2024-02-09T18:34:19.263025073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b76107170ea51e085590a95a70617293693111a472f095e7ecac2cf35a24bda pid=2892 runtime=io.containerd.runc.v2 Feb 9 18:34:19.278828 systemd[1]: Started cri-containerd-1b76107170ea51e085590a95a70617293693111a472f095e7ecac2cf35a24bda.scope. Feb 9 18:34:19.292607 env[1356]: time="2024-02-09T18:34:19.292530293Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:19.292814 env[1356]: time="2024-02-09T18:34:19.292789041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:19.292936 env[1356]: time="2024-02-09T18:34:19.292915816Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:19.293288 env[1356]: time="2024-02-09T18:34:19.293194961Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b pid=2923 runtime=io.containerd.runc.v2 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit: BPF prog-id=125 op=LOAD Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2892 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373631303731373065613531653038353539306139356137303631 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2892 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373631303731373065613531653038353539306139356137303631 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.306000 audit: BPF prog-id=126 op=LOAD Feb 9 18:34:19.306000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2892 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373631303731373065613531653038353539306139356137303631 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit: BPF prog-id=127 op=LOAD Feb 9 18:34:19.307000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2892 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373631303731373065613531653038353539306139356137303631 Feb 9 18:34:19.307000 audit: BPF prog-id=127 op=UNLOAD Feb 9 18:34:19.307000 audit: BPF prog-id=126 op=UNLOAD Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.307000 audit: BPF prog-id=128 op=LOAD Feb 9 18:34:19.307000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2892 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373631303731373065613531653038353539306139356137303631 Feb 9 18:34:19.314458 systemd[1]: Started cri-containerd-78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b.scope. Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.338000 audit: BPF prog-id=129 op=LOAD Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2923 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738626261313165336362656530373839343032386662393436636237 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2923 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738626261313165336362656530373839343032386662393436636237 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.339000 audit: BPF prog-id=130 op=LOAD Feb 9 18:34:19.339000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2923 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738626261313165336362656530373839343032386662393436636237 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.340000 audit: BPF prog-id=131 op=LOAD Feb 9 18:34:19.340000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2923 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738626261313165336362656530373839343032386662393436636237 Feb 9 18:34:19.340000 audit: BPF prog-id=131 op=UNLOAD Feb 9 18:34:19.341000 audit: BPF prog-id=130 op=UNLOAD Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:19.341000 audit: BPF prog-id=132 op=LOAD Feb 9 18:34:19.341000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2923 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738626261313165336362656530373839343032386662393436636237 Feb 9 18:34:19.345581 env[1356]: time="2024-02-09T18:34:19.345541235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5675fcc9f8-6q59p,Uid:f2fa66fc-1e57-4972-a77e-4b30b4fa6e96,Namespace:calico-system,Attempt:0,} returns sandbox id \"1b76107170ea51e085590a95a70617293693111a472f095e7ecac2cf35a24bda\"" Feb 9 18:34:19.347863 env[1356]: time="2024-02-09T18:34:19.347833103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 18:34:19.374989 env[1356]: time="2024-02-09T18:34:19.374945115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l5mjm,Uid:59b5363e-cbbb-481b-82f8-412a9688f7f7,Namespace:calico-system,Attempt:0,} returns sandbox id \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\"" Feb 9 18:34:19.732000 audit[2970]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:19.732000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd4b12450 a2=0 a3=ffff879c66c0 items=0 ppid=2593 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:19.735000 audit[2970]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:19.735000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd4b12450 a2=0 a3=ffff879c66c0 items=0 ppid=2593 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:19.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:20.903967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount753492196.mount: Deactivated successfully. Feb 9 18:34:21.366766 kubelet[2458]: E0209 18:34:21.366718 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:21.835015 env[1356]: time="2024-02-09T18:34:21.834968297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:21.840526 env[1356]: time="2024-02-09T18:34:21.840490048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:21.844325 env[1356]: time="2024-02-09T18:34:21.844285887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:21.847126 env[1356]: time="2024-02-09T18:34:21.847095314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:21.847533 env[1356]: time="2024-02-09T18:34:21.847499357Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 18:34:21.854945 env[1356]: time="2024-02-09T18:34:21.854906270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:34:21.863389 env[1356]: time="2024-02-09T18:34:21.863341668Z" level=info msg="CreateContainer within sandbox \"1b76107170ea51e085590a95a70617293693111a472f095e7ecac2cf35a24bda\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:34:21.891994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount987896183.mount: Deactivated successfully. Feb 9 18:34:21.906955 env[1356]: time="2024-02-09T18:34:21.906875000Z" level=info msg="CreateContainer within sandbox \"1b76107170ea51e085590a95a70617293693111a472f095e7ecac2cf35a24bda\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b6738d7a947970d2023ec8b632de813c1886a0c5c88c016f5dd036de18cb0315\"" Feb 9 18:34:21.907844 env[1356]: time="2024-02-09T18:34:21.907817341Z" level=info msg="StartContainer for \"b6738d7a947970d2023ec8b632de813c1886a0c5c88c016f5dd036de18cb0315\"" Feb 9 18:34:21.926709 systemd[1]: Started cri-containerd-b6738d7a947970d2023ec8b632de813c1886a0c5c88c016f5dd036de18cb0315.scope. Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.947000 audit: BPF prog-id=133 op=LOAD Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2892 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373338643761393437393730643230323365633862363332646538 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2892 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373338643761393437393730643230323365633862363332646538 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.948000 audit: BPF prog-id=134 op=LOAD Feb 9 18:34:21.948000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2892 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373338643761393437393730643230323365633862363332646538 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.949000 audit: BPF prog-id=135 op=LOAD Feb 9 18:34:21.949000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2892 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:21.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373338643761393437393730643230323365633862363332646538 Feb 9 18:34:21.949000 audit: BPF prog-id=135 op=UNLOAD Feb 9 18:34:21.949000 audit: BPF prog-id=134 op=UNLOAD Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:21.950000 audit: BPF prog-id=136 op=LOAD Feb 9 18:34:21.950000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2892 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:21.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373338643761393437393730643230323365633862363332646538 Feb 9 18:34:21.985394 env[1356]: time="2024-02-09T18:34:21.985349017Z" level=info msg="StartContainer for \"b6738d7a947970d2023ec8b632de813c1886a0c5c88c016f5dd036de18cb0315\" returns successfully" Feb 9 18:34:22.463439 kubelet[2458]: I0209 18:34:22.463404 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5675fcc9f8-6q59p" podStartSLOduration=1.962374254 podCreationTimestamp="2024-02-09 18:34:18 +0000 UTC" firstStartedPulling="2024-02-09 18:34:19.347319444 +0000 UTC m=+20.103638244" lastFinishedPulling="2024-02-09 18:34:21.848312002 +0000 UTC m=+22.604630802" observedRunningTime="2024-02-09 18:34:22.463361333 +0000 UTC m=+23.219680133" watchObservedRunningTime="2024-02-09 18:34:22.463366812 +0000 UTC m=+23.219685612" Feb 9 18:34:22.511925 kubelet[2458]: E0209 18:34:22.511894 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.512117 kubelet[2458]: W0209 18:34:22.512099 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.512239 kubelet[2458]: E0209 18:34:22.512189 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.512531 kubelet[2458]: E0209 18:34:22.512507 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.512621 kubelet[2458]: W0209 18:34:22.512608 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.512678 kubelet[2458]: E0209 18:34:22.512670 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.512887 kubelet[2458]: E0209 18:34:22.512875 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.512963 kubelet[2458]: W0209 18:34:22.512951 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.513029 kubelet[2458]: E0209 18:34:22.513020 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.513369 kubelet[2458]: E0209 18:34:22.513356 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.513449 kubelet[2458]: W0209 18:34:22.513437 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.513534 kubelet[2458]: E0209 18:34:22.513523 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.513794 kubelet[2458]: E0209 18:34:22.513781 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.513872 kubelet[2458]: W0209 18:34:22.513861 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.513942 kubelet[2458]: E0209 18:34:22.513932 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.516605 kubelet[2458]: E0209 18:34:22.516587 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.516710 kubelet[2458]: W0209 18:34:22.516698 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.516770 kubelet[2458]: E0209 18:34:22.516760 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.517033 kubelet[2458]: E0209 18:34:22.517019 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.517117 kubelet[2458]: W0209 18:34:22.517105 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.517179 kubelet[2458]: E0209 18:34:22.517170 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.517560 kubelet[2458]: E0209 18:34:22.517546 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.517657 kubelet[2458]: W0209 18:34:22.517645 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.517732 kubelet[2458]: E0209 18:34:22.517722 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.519356 kubelet[2458]: E0209 18:34:22.519328 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.519356 kubelet[2458]: W0209 18:34:22.519344 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.519356 kubelet[2458]: E0209 18:34:22.519360 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.519657 kubelet[2458]: E0209 18:34:22.519633 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.519657 kubelet[2458]: W0209 18:34:22.519648 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.519740 kubelet[2458]: E0209 18:34:22.519662 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.519828 kubelet[2458]: E0209 18:34:22.519806 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.519828 kubelet[2458]: W0209 18:34:22.519820 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.519894 kubelet[2458]: E0209 18:34:22.519832 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.519988 kubelet[2458]: E0209 18:34:22.519965 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.519988 kubelet[2458]: W0209 18:34:22.519983 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.520052 kubelet[2458]: E0209 18:34:22.519994 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.520151 kubelet[2458]: E0209 18:34:22.520130 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.520151 kubelet[2458]: W0209 18:34:22.520143 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.520259 kubelet[2458]: E0209 18:34:22.520155 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.520340 kubelet[2458]: E0209 18:34:22.520320 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.520340 kubelet[2458]: W0209 18:34:22.520333 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.520404 kubelet[2458]: E0209 18:34:22.520345 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.520486 kubelet[2458]: E0209 18:34:22.520466 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.520486 kubelet[2458]: W0209 18:34:22.520478 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.520486 kubelet[2458]: E0209 18:34:22.520489 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.534992 kubelet[2458]: E0209 18:34:22.534958 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.534992 kubelet[2458]: W0209 18:34:22.534983 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.535174 kubelet[2458]: E0209 18:34:22.535006 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.535422 kubelet[2458]: E0209 18:34:22.535400 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.535422 kubelet[2458]: W0209 18:34:22.535417 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.535527 kubelet[2458]: E0209 18:34:22.535434 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.535694 kubelet[2458]: E0209 18:34:22.535673 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.535694 kubelet[2458]: W0209 18:34:22.535688 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.535779 kubelet[2458]: E0209 18:34:22.535705 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.535943 kubelet[2458]: E0209 18:34:22.535927 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.535943 kubelet[2458]: W0209 18:34:22.535939 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.536026 kubelet[2458]: E0209 18:34:22.535955 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.536165 kubelet[2458]: E0209 18:34:22.536146 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.536165 kubelet[2458]: W0209 18:34:22.536161 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.536331 kubelet[2458]: E0209 18:34:22.536177 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.536745 kubelet[2458]: E0209 18:34:22.536725 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.536745 kubelet[2458]: W0209 18:34:22.536739 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.536857 kubelet[2458]: E0209 18:34:22.536835 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.537015 kubelet[2458]: E0209 18:34:22.536999 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.537015 kubelet[2458]: W0209 18:34:22.537010 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.537099 kubelet[2458]: E0209 18:34:22.537085 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.537310 kubelet[2458]: E0209 18:34:22.537292 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.537310 kubelet[2458]: W0209 18:34:22.537304 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.537407 kubelet[2458]: E0209 18:34:22.537383 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.537555 kubelet[2458]: E0209 18:34:22.537540 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.537555 kubelet[2458]: W0209 18:34:22.537551 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.537641 kubelet[2458]: E0209 18:34:22.537567 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.538053 kubelet[2458]: E0209 18:34:22.538027 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.538053 kubelet[2458]: W0209 18:34:22.538044 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.538053 kubelet[2458]: E0209 18:34:22.538063 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.538806 kubelet[2458]: E0209 18:34:22.538781 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.538806 kubelet[2458]: W0209 18:34:22.538795 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.538920 kubelet[2458]: E0209 18:34:22.538821 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.539366 kubelet[2458]: E0209 18:34:22.539345 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.539366 kubelet[2458]: W0209 18:34:22.539363 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.539494 kubelet[2458]: E0209 18:34:22.539481 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.539589 kubelet[2458]: E0209 18:34:22.539524 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.539659 kubelet[2458]: W0209 18:34:22.539647 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.539727 kubelet[2458]: E0209 18:34:22.539716 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.540062 kubelet[2458]: E0209 18:34:22.540044 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.540161 kubelet[2458]: W0209 18:34:22.540146 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.540264 kubelet[2458]: E0209 18:34:22.540255 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.540755 kubelet[2458]: E0209 18:34:22.540740 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.540829 kubelet[2458]: W0209 18:34:22.540817 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.540929 kubelet[2458]: E0209 18:34:22.540902 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.541290 kubelet[2458]: E0209 18:34:22.541274 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.541382 kubelet[2458]: W0209 18:34:22.541370 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.541454 kubelet[2458]: E0209 18:34:22.541444 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.541661 kubelet[2458]: E0209 18:34:22.541634 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.541661 kubelet[2458]: W0209 18:34:22.541652 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.541739 kubelet[2458]: E0209 18:34:22.541670 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:22.541949 kubelet[2458]: E0209 18:34:22.541931 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:22.541949 kubelet[2458]: W0209 18:34:22.541947 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:22.542021 kubelet[2458]: E0209 18:34:22.541961 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.350628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2926732521.mount: Deactivated successfully. Feb 9 18:34:23.366691 kubelet[2458]: E0209 18:34:23.366363 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:23.452424 kubelet[2458]: I0209 18:34:23.452386 2458 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:34:23.526029 kubelet[2458]: E0209 18:34:23.525887 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.526029 kubelet[2458]: W0209 18:34:23.525910 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.526029 kubelet[2458]: E0209 18:34:23.525934 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.526638 kubelet[2458]: E0209 18:34:23.526531 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.526638 kubelet[2458]: W0209 18:34:23.526544 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.526638 kubelet[2458]: E0209 18:34:23.526559 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.526969 kubelet[2458]: E0209 18:34:23.526818 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.526969 kubelet[2458]: W0209 18:34:23.526830 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.526969 kubelet[2458]: E0209 18:34:23.526842 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.527310 kubelet[2458]: E0209 18:34:23.527149 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.527310 kubelet[2458]: W0209 18:34:23.527162 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.527310 kubelet[2458]: E0209 18:34:23.527174 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.527624 kubelet[2458]: E0209 18:34:23.527524 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.527624 kubelet[2458]: W0209 18:34:23.527535 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.527624 kubelet[2458]: E0209 18:34:23.527548 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.527926 kubelet[2458]: E0209 18:34:23.527795 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.527926 kubelet[2458]: W0209 18:34:23.527807 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.527926 kubelet[2458]: E0209 18:34:23.527820 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.528224 kubelet[2458]: E0209 18:34:23.528102 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.528224 kubelet[2458]: W0209 18:34:23.528114 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.528224 kubelet[2458]: E0209 18:34:23.528126 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.528568 kubelet[2458]: E0209 18:34:23.528450 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.528568 kubelet[2458]: W0209 18:34:23.528462 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.528568 kubelet[2458]: E0209 18:34:23.528477 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.528835 kubelet[2458]: E0209 18:34:23.528739 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.528835 kubelet[2458]: W0209 18:34:23.528750 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.528835 kubelet[2458]: E0209 18:34:23.528762 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.529118 kubelet[2458]: E0209 18:34:23.529013 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.529118 kubelet[2458]: W0209 18:34:23.529025 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.529118 kubelet[2458]: E0209 18:34:23.529040 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.529386 kubelet[2458]: E0209 18:34:23.529287 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.529386 kubelet[2458]: W0209 18:34:23.529299 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.529386 kubelet[2458]: E0209 18:34:23.529310 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.529576 kubelet[2458]: E0209 18:34:23.529564 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.529729 kubelet[2458]: W0209 18:34:23.529628 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.529729 kubelet[2458]: E0209 18:34:23.529645 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.529872 kubelet[2458]: E0209 18:34:23.529860 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.529972 kubelet[2458]: W0209 18:34:23.529960 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.530030 kubelet[2458]: E0209 18:34:23.530021 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.530329 kubelet[2458]: E0209 18:34:23.530314 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.530409 kubelet[2458]: W0209 18:34:23.530397 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.530477 kubelet[2458]: E0209 18:34:23.530468 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.530716 kubelet[2458]: E0209 18:34:23.530703 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.530799 kubelet[2458]: W0209 18:34:23.530787 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.530858 kubelet[2458]: E0209 18:34:23.530850 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.541363 kubelet[2458]: E0209 18:34:23.541331 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.541363 kubelet[2458]: W0209 18:34:23.541353 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.541540 kubelet[2458]: E0209 18:34:23.541377 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.541635 kubelet[2458]: E0209 18:34:23.541614 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.541635 kubelet[2458]: W0209 18:34:23.541630 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.541727 kubelet[2458]: E0209 18:34:23.541648 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.542290 kubelet[2458]: E0209 18:34:23.542269 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.542290 kubelet[2458]: W0209 18:34:23.542284 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.542402 kubelet[2458]: E0209 18:34:23.542303 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.542525 kubelet[2458]: E0209 18:34:23.542508 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.542525 kubelet[2458]: W0209 18:34:23.542522 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.542604 kubelet[2458]: E0209 18:34:23.542537 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.542760 kubelet[2458]: E0209 18:34:23.542739 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.542760 kubelet[2458]: W0209 18:34:23.542756 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.542877 kubelet[2458]: E0209 18:34:23.542861 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.542943 kubelet[2458]: E0209 18:34:23.542895 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.543005 kubelet[2458]: W0209 18:34:23.542993 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.543099 kubelet[2458]: E0209 18:34:23.543074 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.543334 kubelet[2458]: E0209 18:34:23.543319 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.543419 kubelet[2458]: W0209 18:34:23.543406 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.543519 kubelet[2458]: E0209 18:34:23.543492 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.543743 kubelet[2458]: E0209 18:34:23.543729 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.543824 kubelet[2458]: W0209 18:34:23.543812 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.543893 kubelet[2458]: E0209 18:34:23.543883 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.544899 kubelet[2458]: E0209 18:34:23.544869 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.544899 kubelet[2458]: W0209 18:34:23.544889 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.544899 kubelet[2458]: E0209 18:34:23.544910 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.545097 kubelet[2458]: E0209 18:34:23.545070 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.545097 kubelet[2458]: W0209 18:34:23.545084 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.545097 kubelet[2458]: E0209 18:34:23.545094 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.545357 env[1356]: time="2024-02-09T18:34:23.545313928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.546104 kubelet[2458]: E0209 18:34:23.546081 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.546151 kubelet[2458]: W0209 18:34:23.546109 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.546281 kubelet[2458]: E0209 18:34:23.546257 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.546480 kubelet[2458]: E0209 18:34:23.546450 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.546480 kubelet[2458]: W0209 18:34:23.546465 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.546597 kubelet[2458]: E0209 18:34:23.546581 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.546674 kubelet[2458]: E0209 18:34:23.546619 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.546730 kubelet[2458]: W0209 18:34:23.546718 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.546838 kubelet[2458]: E0209 18:34:23.546814 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.547563 kubelet[2458]: E0209 18:34:23.547541 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.547654 kubelet[2458]: W0209 18:34:23.547639 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.547742 kubelet[2458]: E0209 18:34:23.547729 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.548540 kubelet[2458]: E0209 18:34:23.548523 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.548627 kubelet[2458]: W0209 18:34:23.548615 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.548687 kubelet[2458]: E0209 18:34:23.548677 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.553950 env[1356]: time="2024-02-09T18:34:23.553884639Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.557393 kubelet[2458]: E0209 18:34:23.557360 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.557393 kubelet[2458]: W0209 18:34:23.557383 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.557511 kubelet[2458]: E0209 18:34:23.557422 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.557769 env[1356]: time="2024-02-09T18:34:23.557712539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.558136 kubelet[2458]: E0209 18:34:23.558108 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.558219 kubelet[2458]: W0209 18:34:23.558138 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.558219 kubelet[2458]: E0209 18:34:23.558156 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.559404 kubelet[2458]: E0209 18:34:23.559377 2458 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:34:23.559404 kubelet[2458]: W0209 18:34:23.559399 2458 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:34:23.559404 kubelet[2458]: E0209 18:34:23.559415 2458 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:34:23.562483 env[1356]: time="2024-02-09T18:34:23.562428196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:23.563045 env[1356]: time="2024-02-09T18:34:23.563009449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 18:34:23.567465 env[1356]: time="2024-02-09T18:34:23.567420602Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:34:23.601420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2909191838.mount: Deactivated successfully. Feb 9 18:34:23.622263 env[1356]: time="2024-02-09T18:34:23.622180100Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24\"" Feb 9 18:34:23.623099 env[1356]: time="2024-02-09T18:34:23.623072017Z" level=info msg="StartContainer for \"4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24\"" Feb 9 18:34:23.639180 systemd[1]: Started cri-containerd-4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24.scope. Feb 9 18:34:23.673249 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 18:34:23.673387 kernel: audit: type=1400 audit(1707503663.664:1094): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2923 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:23.724882 kernel: audit: type=1300 audit(1707503663.664:1094): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2923 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:23.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353564643864353363303234373235316439663830336631373966 Feb 9 18:34:23.754532 kernel: audit: type=1327 audit(1707503663.664:1094): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353564643864353363303234373235316439663830336631373966 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.778259 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.801258 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.823620 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.847864 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.868903 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.874577 systemd[1]: cri-containerd-4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24.scope: Deactivated successfully. Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.881068 env[1356]: time="2024-02-09T18:34:23.881027566Z" level=info msg="StartContainer for \"4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24\" returns successfully" Feb 9 18:34:23.901541 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.922335 kernel: audit: type=1400 audit(1707503663.664:1095): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit: BPF prog-id=137 op=LOAD Feb 9 18:34:23.664000 audit[3087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2923 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:23.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353564643864353363303234373235316439663830336631373966 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit: BPF prog-id=138 op=LOAD Feb 9 18:34:23.664000 audit[3087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2923 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:23.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353564643864353363303234373235316439663830336631373966 Feb 9 18:34:23.664000 audit: BPF prog-id=138 op=UNLOAD Feb 9 18:34:23.664000 audit: BPF prog-id=137 op=UNLOAD Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:23.664000 audit: BPF prog-id=139 op=LOAD Feb 9 18:34:23.664000 audit[3087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2923 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:23.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353564643864353363303234373235316439663830336631373966 Feb 9 18:34:23.878000 audit: BPF prog-id=139 op=UNLOAD Feb 9 18:34:23.933949 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24-rootfs.mount: Deactivated successfully. Feb 9 18:34:24.785849 env[1356]: time="2024-02-09T18:34:24.785771879Z" level=info msg="shim disconnected" id=4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24 Feb 9 18:34:24.786359 env[1356]: time="2024-02-09T18:34:24.786333178Z" level=warning msg="cleaning up after shim disconnected" id=4155dd8d53c0247251d9f803f179fc64eda2f3f10e23e736b1d4f222c0aeba24 namespace=k8s.io Feb 9 18:34:24.786448 env[1356]: time="2024-02-09T18:34:24.786434000Z" level=info msg="cleaning up dead shim" Feb 9 18:34:24.793476 env[1356]: time="2024-02-09T18:34:24.793436221Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:34:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3130 runtime=io.containerd.runc.v2\n" Feb 9 18:34:25.365979 kubelet[2458]: E0209 18:34:25.365545 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:25.461263 env[1356]: time="2024-02-09T18:34:25.461008622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:34:26.746667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount559952335.mount: Deactivated successfully. Feb 9 18:34:26.969793 kubelet[2458]: I0209 18:34:26.969417 2458 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:34:26.996000 audit[3143]: NETFILTER_CFG table=filter:100 family=2 entries=15 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:26.996000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe1437650 a2=0 a3=ffff915086c0 items=0 ppid=2593 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:26.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:26.998000 audit[3143]: NETFILTER_CFG table=nat:101 family=2 entries=19 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:26.998000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe1437650 a2=0 a3=ffff915086c0 items=0 ppid=2593 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:26.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:27.365575 kubelet[2458]: E0209 18:34:27.365537 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:29.366385 kubelet[2458]: E0209 18:34:29.366261 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:29.905003 env[1356]: time="2024-02-09T18:34:29.904957234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:29.910371 env[1356]: time="2024-02-09T18:34:29.910333749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:29.913899 env[1356]: time="2024-02-09T18:34:29.913867806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:29.919448 env[1356]: time="2024-02-09T18:34:29.919415852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:29.920169 env[1356]: time="2024-02-09T18:34:29.920140813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 18:34:29.922723 env[1356]: time="2024-02-09T18:34:29.922695312Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:34:29.965772 env[1356]: time="2024-02-09T18:34:29.965712104Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636\"" Feb 9 18:34:29.966806 env[1356]: time="2024-02-09T18:34:29.966769770Z" level=info msg="StartContainer for \"81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636\"" Feb 9 18:34:30.002154 systemd[1]: Started cri-containerd-81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636.scope. Feb 9 18:34:30.015000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.022696 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 18:34:30.022805 kernel: audit: type=1400 audit(1707503670.015:1103): avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.015000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2923 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.075238 kernel: audit: type=1300 audit(1707503670.015:1103): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2923 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643935353231636264653666336638626233663231663763323764 Feb 9 18:34:30.108768 kernel: audit: type=1327 audit(1707503670.015:1103): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643935353231636264653666336638626233663231663763323764 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.129020 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.148557 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.168901 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.188997 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189226 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.189586 env[1356]: time="2024-02-09T18:34:30.189546374Z" level=info msg="StartContainer for \"81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636\" returns successfully" Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.227384 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.227457 kernel: audit: type=1400 audit(1707503670.020:1104): avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.020000 audit: BPF prog-id=140 op=LOAD Feb 9 18:34:30.020000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2923 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643935353231636264653666336638626233663231663763323764 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.021000 audit: BPF prog-id=141 op=LOAD Feb 9 18:34:30.021000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2923 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643935353231636264653666336638626233663231663763323764 Feb 9 18:34:30.043000 audit: BPF prog-id=141 op=UNLOAD Feb 9 18:34:30.043000 audit: BPF prog-id=140 op=UNLOAD Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:30.043000 audit: BPF prog-id=142 op=LOAD Feb 9 18:34:30.043000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2923 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:30.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643935353231636264653666336638626233663231663763323764 Feb 9 18:34:31.366434 kubelet[2458]: E0209 18:34:31.366403 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:31.505907 env[1356]: time="2024-02-09T18:34:31.505842956Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:34:31.508548 systemd[1]: cri-containerd-81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636.scope: Deactivated successfully. Feb 9 18:34:31.512000 audit: BPF prog-id=142 op=UNLOAD Feb 9 18:34:31.526716 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636-rootfs.mount: Deactivated successfully. Feb 9 18:34:31.605817 kubelet[2458]: I0209 18:34:31.605785 2458 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.633258 2458 topology_manager.go:215] "Topology Admit Handler" podUID="a4b2c988-42e7-43af-8eae-10692f5156e6" podNamespace="kube-system" podName="coredns-5dd5756b68-wjrh2" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.645173 2458 topology_manager.go:215] "Topology Admit Handler" podUID="11e6a030-b3b1-433f-a224-a0d71eb104cb" podNamespace="calico-system" podName="calico-kube-controllers-79b7b4c578-7ccp5" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.645974 2458 topology_manager.go:215] "Topology Admit Handler" podUID="1603f8c7-df14-4b1d-9532-c95bd3f20548" podNamespace="kube-system" podName="coredns-5dd5756b68-c8w8g" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.720638 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x5cgs\" (UniqueName: \"kubernetes.io/projected/a4b2c988-42e7-43af-8eae-10692f5156e6-kube-api-access-x5cgs\") pod \"coredns-5dd5756b68-wjrh2\" (UID: \"a4b2c988-42e7-43af-8eae-10692f5156e6\") " pod="kube-system/coredns-5dd5756b68-wjrh2" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.720681 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/11e6a030-b3b1-433f-a224-a0d71eb104cb-tigera-ca-bundle\") pod \"calico-kube-controllers-79b7b4c578-7ccp5\" (UID: \"11e6a030-b3b1-433f-a224-a0d71eb104cb\") " pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" Feb 9 18:34:31.842844 kubelet[2458]: I0209 18:34:31.720740 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1603f8c7-df14-4b1d-9532-c95bd3f20548-config-volume\") pod \"coredns-5dd5756b68-c8w8g\" (UID: \"1603f8c7-df14-4b1d-9532-c95bd3f20548\") " pod="kube-system/coredns-5dd5756b68-c8w8g" Feb 9 18:34:31.638419 systemd[1]: Created slice kubepods-burstable-poda4b2c988_42e7_43af_8eae_10692f5156e6.slice. Feb 9 18:34:31.843159 kubelet[2458]: I0209 18:34:31.720772 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ldxm9\" (UniqueName: \"kubernetes.io/projected/11e6a030-b3b1-433f-a224-a0d71eb104cb-kube-api-access-ldxm9\") pod \"calico-kube-controllers-79b7b4c578-7ccp5\" (UID: \"11e6a030-b3b1-433f-a224-a0d71eb104cb\") " pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" Feb 9 18:34:31.843159 kubelet[2458]: I0209 18:34:31.720848 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a4b2c988-42e7-43af-8eae-10692f5156e6-config-volume\") pod \"coredns-5dd5756b68-wjrh2\" (UID: \"a4b2c988-42e7-43af-8eae-10692f5156e6\") " pod="kube-system/coredns-5dd5756b68-wjrh2" Feb 9 18:34:31.843159 kubelet[2458]: I0209 18:34:31.720872 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2c7bx\" (UniqueName: \"kubernetes.io/projected/1603f8c7-df14-4b1d-9532-c95bd3f20548-kube-api-access-2c7bx\") pod \"coredns-5dd5756b68-c8w8g\" (UID: \"1603f8c7-df14-4b1d-9532-c95bd3f20548\") " pod="kube-system/coredns-5dd5756b68-c8w8g" Feb 9 18:34:31.650883 systemd[1]: Created slice kubepods-besteffort-pod11e6a030_b3b1_433f_a224_a0d71eb104cb.slice. Feb 9 18:34:31.656115 systemd[1]: Created slice kubepods-burstable-pod1603f8c7_df14_4b1d_9532_c95bd3f20548.slice. Feb 9 18:34:32.148263 env[1356]: time="2024-02-09T18:34:32.147829665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wjrh2,Uid:a4b2c988-42e7-43af-8eae-10692f5156e6,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:32.154590 env[1356]: time="2024-02-09T18:34:32.154344683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79b7b4c578-7ccp5,Uid:11e6a030-b3b1-433f-a224-a0d71eb104cb,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:32.155329 env[1356]: time="2024-02-09T18:34:32.155113283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-c8w8g,Uid:1603f8c7-df14-4b1d-9532-c95bd3f20548,Namespace:kube-system,Attempt:0,}" Feb 9 18:34:32.664179 env[1356]: time="2024-02-09T18:34:32.664134113Z" level=info msg="shim disconnected" id=81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636 Feb 9 18:34:32.664606 env[1356]: time="2024-02-09T18:34:32.664586282Z" level=warning msg="cleaning up after shim disconnected" id=81d95521cbde6f3f8bb3f21f7c27dd0fe2718e69e65c4a08b75ec1ab47b1a636 namespace=k8s.io Feb 9 18:34:32.664676 env[1356]: time="2024-02-09T18:34:32.664662830Z" level=info msg="cleaning up dead shim" Feb 9 18:34:32.672981 env[1356]: time="2024-02-09T18:34:32.672943571Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:34:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3206 runtime=io.containerd.runc.v2\n" Feb 9 18:34:32.787421 env[1356]: time="2024-02-09T18:34:32.787345025Z" level=error msg="Failed to destroy network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.787913 env[1356]: time="2024-02-09T18:34:32.787878101Z" level=error msg="encountered an error cleaning up failed sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.788054 env[1356]: time="2024-02-09T18:34:32.788026878Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wjrh2,Uid:a4b2c988-42e7-43af-8eae-10692f5156e6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.788475 kubelet[2458]: E0209 18:34:32.788401 2458 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.788767 kubelet[2458]: E0209 18:34:32.788509 2458 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wjrh2" Feb 9 18:34:32.788767 kubelet[2458]: E0209 18:34:32.788534 2458 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wjrh2" Feb 9 18:34:32.788767 kubelet[2458]: E0209 18:34:32.788605 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-wjrh2_kube-system(a4b2c988-42e7-43af-8eae-10692f5156e6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-wjrh2_kube-system(a4b2c988-42e7-43af-8eae-10692f5156e6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wjrh2" podUID="a4b2c988-42e7-43af-8eae-10692f5156e6" Feb 9 18:34:32.840643 env[1356]: time="2024-02-09T18:34:32.840572075Z" level=error msg="Failed to destroy network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.840980 env[1356]: time="2024-02-09T18:34:32.840940858Z" level=error msg="encountered an error cleaning up failed sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.841028 env[1356]: time="2024-02-09T18:34:32.841001088Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79b7b4c578-7ccp5,Uid:11e6a030-b3b1-433f-a224-a0d71eb104cb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.841577 kubelet[2458]: E0209 18:34:32.841279 2458 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.841577 kubelet[2458]: E0209 18:34:32.841331 2458 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" Feb 9 18:34:32.841577 kubelet[2458]: E0209 18:34:32.841350 2458 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" Feb 9 18:34:32.841726 kubelet[2458]: E0209 18:34:32.841408 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79b7b4c578-7ccp5_calico-system(11e6a030-b3b1-433f-a224-a0d71eb104cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79b7b4c578-7ccp5_calico-system(11e6a030-b3b1-433f-a224-a0d71eb104cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" podUID="11e6a030-b3b1-433f-a224-a0d71eb104cb" Feb 9 18:34:32.863976 env[1356]: time="2024-02-09T18:34:32.863908255Z" level=error msg="Failed to destroy network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.864313 env[1356]: time="2024-02-09T18:34:32.864278597Z" level=error msg="encountered an error cleaning up failed sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.864358 env[1356]: time="2024-02-09T18:34:32.864333508Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-c8w8g,Uid:1603f8c7-df14-4b1d-9532-c95bd3f20548,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.864961 kubelet[2458]: E0209 18:34:32.864587 2458 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:32.864961 kubelet[2458]: E0209 18:34:32.864648 2458 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-c8w8g" Feb 9 18:34:32.864961 kubelet[2458]: E0209 18:34:32.864669 2458 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-c8w8g" Feb 9 18:34:32.865105 kubelet[2458]: E0209 18:34:32.864727 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-c8w8g_kube-system(1603f8c7-df14-4b1d-9532-c95bd3f20548)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-c8w8g_kube-system(1603f8c7-df14-4b1d-9532-c95bd3f20548)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-c8w8g" podUID="1603f8c7-df14-4b1d-9532-c95bd3f20548" Feb 9 18:34:33.369526 systemd[1]: Created slice kubepods-besteffort-pod04ff6cb3_572d_43b5_899a_f3fe2cdb4af9.slice. Feb 9 18:34:33.372303 env[1356]: time="2024-02-09T18:34:33.372256787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-llbv6,Uid:04ff6cb3-572d-43b5-899a-f3fe2cdb4af9,Namespace:calico-system,Attempt:0,}" Feb 9 18:34:33.456475 env[1356]: time="2024-02-09T18:34:33.456416073Z" level=error msg="Failed to destroy network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.456863 env[1356]: time="2024-02-09T18:34:33.456827130Z" level=error msg="encountered an error cleaning up failed sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.456908 env[1356]: time="2024-02-09T18:34:33.456879681Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-llbv6,Uid:04ff6cb3-572d-43b5-899a-f3fe2cdb4af9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.457173 kubelet[2458]: E0209 18:34:33.457136 2458 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.457247 kubelet[2458]: E0209 18:34:33.457216 2458 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:33.457247 kubelet[2458]: E0209 18:34:33.457238 2458 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-llbv6" Feb 9 18:34:33.457316 kubelet[2458]: E0209 18:34:33.457282 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-llbv6_calico-system(04ff6cb3-572d-43b5-899a-f3fe2cdb4af9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-llbv6_calico-system(04ff6cb3-572d-43b5-899a-f3fe2cdb4af9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:33.474782 kubelet[2458]: I0209 18:34:33.474752 2458 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:33.477233 env[1356]: time="2024-02-09T18:34:33.477175708Z" level=info msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" Feb 9 18:34:33.478813 kubelet[2458]: I0209 18:34:33.478789 2458 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:33.479883 env[1356]: time="2024-02-09T18:34:33.479853054Z" level=info msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" Feb 9 18:34:33.489178 kubelet[2458]: I0209 18:34:33.488761 2458 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:33.489562 env[1356]: time="2024-02-09T18:34:33.489531600Z" level=info msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" Feb 9 18:34:33.491652 kubelet[2458]: I0209 18:34:33.491028 2458 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:33.491946 env[1356]: time="2024-02-09T18:34:33.491919511Z" level=info msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" Feb 9 18:34:33.493870 env[1356]: time="2024-02-09T18:34:33.493841175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:34:33.527100 env[1356]: time="2024-02-09T18:34:33.527047208Z" level=error msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" failed" error="failed to destroy network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.527591 kubelet[2458]: E0209 18:34:33.527564 2458 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:33.527687 kubelet[2458]: E0209 18:34:33.527640 2458 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7"} Feb 9 18:34:33.527687 kubelet[2458]: E0209 18:34:33.527674 2458 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:34:33.527778 kubelet[2458]: E0209 18:34:33.527700 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-llbv6" podUID="04ff6cb3-572d-43b5-899a-f3fe2cdb4af9" Feb 9 18:34:33.561572 env[1356]: time="2024-02-09T18:34:33.561512926Z" level=error msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" failed" error="failed to destroy network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.562764 kubelet[2458]: E0209 18:34:33.562728 2458 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:33.562898 kubelet[2458]: E0209 18:34:33.562777 2458 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993"} Feb 9 18:34:33.562898 kubelet[2458]: E0209 18:34:33.562815 2458 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a4b2c988-42e7-43af-8eae-10692f5156e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:34:33.562898 kubelet[2458]: E0209 18:34:33.562844 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a4b2c988-42e7-43af-8eae-10692f5156e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wjrh2" podUID="a4b2c988-42e7-43af-8eae-10692f5156e6" Feb 9 18:34:33.568149 env[1356]: time="2024-02-09T18:34:33.568095750Z" level=error msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" failed" error="failed to destroy network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.568602 kubelet[2458]: E0209 18:34:33.568572 2458 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:33.568700 kubelet[2458]: E0209 18:34:33.568620 2458 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374"} Feb 9 18:34:33.568700 kubelet[2458]: E0209 18:34:33.568657 2458 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1603f8c7-df14-4b1d-9532-c95bd3f20548\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:34:33.568700 kubelet[2458]: E0209 18:34:33.568686 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1603f8c7-df14-4b1d-9532-c95bd3f20548\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-c8w8g" podUID="1603f8c7-df14-4b1d-9532-c95bd3f20548" Feb 9 18:34:33.570698 env[1356]: time="2024-02-09T18:34:33.570652595Z" level=error msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" failed" error="failed to destroy network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:34:33.571145 kubelet[2458]: E0209 18:34:33.571021 2458 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:33.571145 kubelet[2458]: E0209 18:34:33.571053 2458 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da"} Feb 9 18:34:33.571145 kubelet[2458]: E0209 18:34:33.571095 2458 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"11e6a030-b3b1-433f-a224-a0d71eb104cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:34:33.571145 kubelet[2458]: E0209 18:34:33.571121 2458 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"11e6a030-b3b1-433f-a224-a0d71eb104cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" podUID="11e6a030-b3b1-433f-a224-a0d71eb104cb" Feb 9 18:34:33.697094 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da-shm.mount: Deactivated successfully. Feb 9 18:34:33.697184 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374-shm.mount: Deactivated successfully. Feb 9 18:34:33.697256 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993-shm.mount: Deactivated successfully. Feb 9 18:34:40.094536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount791496893.mount: Deactivated successfully. Feb 9 18:34:40.346355 env[1356]: time="2024-02-09T18:34:40.346233095Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:40.350892 env[1356]: time="2024-02-09T18:34:40.350844533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:40.353914 env[1356]: time="2024-02-09T18:34:40.353868553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:40.357167 env[1356]: time="2024-02-09T18:34:40.357128139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:40.357635 env[1356]: time="2024-02-09T18:34:40.357601193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 18:34:40.373580 env[1356]: time="2024-02-09T18:34:40.373526258Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:34:40.399806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2828151165.mount: Deactivated successfully. Feb 9 18:34:40.417153 env[1356]: time="2024-02-09T18:34:40.417095516Z" level=info msg="CreateContainer within sandbox \"78bba11e3cbee07894028fb946cb707c652cc26456fd456587ad5042c2a9651b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464\"" Feb 9 18:34:40.417935 env[1356]: time="2024-02-09T18:34:40.417905683Z" level=info msg="StartContainer for \"92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464\"" Feb 9 18:34:40.436037 systemd[1]: Started cri-containerd-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464.scope. Feb 9 18:34:40.460428 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:34:40.460563 kernel: audit: type=1400 audit(1707503680.452:1110): avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2923 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:40.515391 kernel: audit: type=1300 audit(1707503680.452:1110): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2923 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663264376666313262623536646263623166666530346462356363 Feb 9 18:34:40.553173 kernel: audit: type=1327 audit(1707503680.452:1110): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663264376666313262623536646263623166666530346462356363 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.577822 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.601488 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.629849 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.630040 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.653955 env[1356]: time="2024-02-09T18:34:40.653902807Z" level=info msg="StartContainer for \"92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464\" returns successfully" Feb 9 18:34:40.676158 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.701730 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.701877 kernel: audit: type=1400 audit(1707503680.452:1111): avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.452000 audit: BPF prog-id=143 op=LOAD Feb 9 18:34:40.452000 audit[3438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2923 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:40.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663264376666313262623536646263623166666530346462356363 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit: BPF prog-id=144 op=LOAD Feb 9 18:34:40.453000 audit[3438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2923 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663264376666313262623536646263623166666530346462356363 Feb 9 18:34:40.453000 audit: BPF prog-id=144 op=UNLOAD Feb 9 18:34:40.453000 audit: BPF prog-id=143 op=UNLOAD Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { perfmon } for pid=3438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit[3438]: AVC avc: denied { bpf } for pid=3438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:40.453000 audit: BPF prog-id=145 op=LOAD Feb 9 18:34:40.453000 audit[3438]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2923 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932663264376666313262623536646263623166666530346462356363 Feb 9 18:34:41.059667 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:34:41.059825 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:34:41.591718 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.P3xush.mount: Deactivated successfully. Feb 9 18:34:42.457000 audit[3571]: AVC avc: denied { write } for pid=3571 comm="tee" name="fd" dev="proc" ino=24015 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.457000 audit[3571]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd66f5965 a2=241 a3=1b6 items=1 ppid=3525 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.457000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:34:42.457000 audit: PATH item=0 name="/dev/fd/63" inode=24003 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.457000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.474000 audit[3575]: AVC avc: denied { write } for pid=3575 comm="tee" name="fd" dev="proc" ino=24026 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.474000 audit[3575]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9e64966 a2=241 a3=1b6 items=1 ppid=3523 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.474000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:34:42.474000 audit: PATH item=0 name="/dev/fd/63" inode=24004 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.485000 audit[3583]: AVC avc: denied { write } for pid=3583 comm="tee" name="fd" dev="proc" ino=24031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.485000 audit[3583]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6bc7975 a2=241 a3=1b6 items=1 ppid=3534 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.485000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:34:42.485000 audit: PATH item=0 name="/dev/fd/63" inode=24023 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.485000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.489000 audit[3581]: AVC avc: denied { write } for pid=3581 comm="tee" name="fd" dev="proc" ino=24035 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.489000 audit[3581]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd3ab4975 a2=241 a3=1b6 items=1 ppid=3527 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.489000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:34:42.489000 audit: PATH item=0 name="/dev/fd/63" inode=24951 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.489000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.492000 audit[3586]: AVC avc: denied { write } for pid=3586 comm="tee" name="fd" dev="proc" ino=24041 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.492000 audit[3586]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc54ce977 a2=241 a3=1b6 items=1 ppid=3528 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.492000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:34:42.492000 audit: PATH item=0 name="/dev/fd/63" inode=24952 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.492000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.494000 audit[3589]: AVC avc: denied { write } for pid=3589 comm="tee" name="fd" dev="proc" ino=24045 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.494000 audit[3589]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd89d6975 a2=241 a3=1b6 items=1 ppid=3531 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.494000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:34:42.494000 audit: PATH item=0 name="/dev/fd/63" inode=24028 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.494000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.505000 audit[3593]: AVC avc: denied { write } for pid=3593 comm="tee" name="fd" dev="proc" ino=24050 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:34:42.505000 audit[3593]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff9f6976 a2=241 a3=1b6 items=1 ppid=3536 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.505000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:34:42.505000 audit: PATH item=0 name="/dev/fd/63" inode=24047 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:34:42.505000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:34:42.596415 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.mh4wew.mount: Deactivated successfully. Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.938000 audit: BPF prog-id=146 op=LOAD Feb 9 18:34:42.938000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd9bc7fb8 a2=70 a3=0 items=0 ppid=3530 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.938000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:34:42.939000 audit: BPF prog-id=146 op=UNLOAD Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit: BPF prog-id=147 op=LOAD Feb 9 18:34:42.939000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd9bc7fb8 a2=70 a3=4a174c items=0 ppid=3530 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.939000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:34:42.939000 audit: BPF prog-id=147 op=UNLOAD Feb 9 18:34:42.939000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.939000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd9bc7fe8 a2=70 a3=253d79f items=0 ppid=3530 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.939000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.943000 audit: BPF prog-id=148 op=LOAD Feb 9 18:34:42.943000 audit[3681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd9bc7f38 a2=70 a3=253d7b9 items=0 ppid=3530 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.943000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:34:42.949000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.949000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf0b2658 a2=70 a3=0 items=0 ppid=3530 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:34:42.950000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:42.950000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf0b2538 a2=70 a3=2 items=0 ppid=3530 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:42.950000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:34:42.957000 audit: BPF prog-id=148 op=UNLOAD Feb 9 18:34:43.073000 audit[3711]: NETFILTER_CFG table=nat:102 family=2 entries=16 op=nft_register_chain pid=3711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:43.073000 audit[3711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffdbb2b7d0 a2=0 a3=ffff8803dfa8 items=0 ppid=3530 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:43.073000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:43.076000 audit[3714]: NETFILTER_CFG table=mangle:103 family=2 entries=19 op=nft_register_chain pid=3714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:43.076000 audit[3714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffcbe5e920 a2=0 a3=ffffa809cfa8 items=0 ppid=3530 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:43.076000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:43.078000 audit[3712]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=3712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:43.078000 audit[3712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd5c15060 a2=0 a3=ffff8cda5fa8 items=0 ppid=3530 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:43.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:43.091000 audit[3710]: NETFILTER_CFG table=raw:105 family=2 entries=19 op=nft_register_chain pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:43.091000 audit[3710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffebfc24e0 a2=0 a3=ffffb5a41fa8 items=0 ppid=3530 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:43.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:43.832149 systemd-networkd[1504]: vxlan.calico: Link UP Feb 9 18:34:43.832156 systemd-networkd[1504]: vxlan.calico: Gained carrier Feb 9 18:34:44.366285 env[1356]: time="2024-02-09T18:34:44.366236304Z" level=info msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" Feb 9 18:34:44.419235 kubelet[2458]: I0209 18:34:44.418788 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-l5mjm" podStartSLOduration=5.437634024 podCreationTimestamp="2024-02-09 18:34:18 +0000 UTC" firstStartedPulling="2024-02-09 18:34:19.376759637 +0000 UTC m=+20.133078437" lastFinishedPulling="2024-02-09 18:34:40.357870716 +0000 UTC m=+41.114189516" observedRunningTime="2024-02-09 18:34:41.603150528 +0000 UTC m=+42.359469328" watchObservedRunningTime="2024-02-09 18:34:44.418745103 +0000 UTC m=+45.175063903" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.418 [INFO][3738] k8s.go 578: Cleaning up netns ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.418 [INFO][3738] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" iface="eth0" netns="/var/run/netns/cni-ecbf2e42-18cd-fb63-68f9-ab9683ad4927" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.418 [INFO][3738] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" iface="eth0" netns="/var/run/netns/cni-ecbf2e42-18cd-fb63-68f9-ab9683ad4927" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.419 [INFO][3738] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" iface="eth0" netns="/var/run/netns/cni-ecbf2e42-18cd-fb63-68f9-ab9683ad4927" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.419 [INFO][3738] k8s.go 585: Releasing IP address(es) ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.419 [INFO][3738] utils.go 188: Calico CNI releasing IP address ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.439 [INFO][3744] ipam_plugin.go 415: Releasing address using handleID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.439 [INFO][3744] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.439 [INFO][3744] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.448 [WARNING][3744] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.448 [INFO][3744] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.449 [INFO][3744] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:44.452086 env[1356]: 2024-02-09 18:34:44.450 [INFO][3738] k8s.go 591: Teardown processing complete. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:44.455762 env[1356]: time="2024-02-09T18:34:44.454256701Z" level=info msg="TearDown network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" successfully" Feb 9 18:34:44.455762 env[1356]: time="2024-02-09T18:34:44.454301176Z" level=info msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" returns successfully" Feb 9 18:34:44.454474 systemd[1]: run-netns-cni\x2decbf2e42\x2d18cd\x2dfb63\x2d68f9\x2dab9683ad4927.mount: Deactivated successfully. Feb 9 18:34:44.456800 env[1356]: time="2024-02-09T18:34:44.456770250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-c8w8g,Uid:1603f8c7-df14-4b1d-9532-c95bd3f20548,Namespace:kube-system,Attempt:1,}" Feb 9 18:34:44.631515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:34:44.631679 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali320f615b76e: link becomes ready Feb 9 18:34:44.634111 systemd-networkd[1504]: cali320f615b76e: Link UP Feb 9 18:34:44.634638 systemd-networkd[1504]: cali320f615b76e: Gained carrier Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.530 [INFO][3752] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0 coredns-5dd5756b68- kube-system 1603f8c7-df14-4b1d-9532-c95bd3f20548 701 0 2024-02-09 18:34:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 coredns-5dd5756b68-c8w8g eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali320f615b76e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.530 [INFO][3752] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.567 [INFO][3763] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" HandleID="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.580 [INFO][3763] ipam_plugin.go 268: Auto assigning IP ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" HandleID="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd800), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"coredns-5dd5756b68-c8w8g", "timestamp":"2024-02-09 18:34:44.567818852 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.580 [INFO][3763] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.580 [INFO][3763] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.580 [INFO][3763] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.582 [INFO][3763] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.589 [INFO][3763] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.595 [INFO][3763] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.596 [INFO][3763] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.599 [INFO][3763] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.599 [INFO][3763] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.601 [INFO][3763] ipam.go 1682: Creating new handle: k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74 Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.605 [INFO][3763] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.610 [INFO][3763] ipam.go 1216: Successfully claimed IPs: [192.168.96.193/26] block=192.168.96.192/26 handle="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.610 [INFO][3763] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.193/26] handle="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.610 [INFO][3763] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:44.652869 env[1356]: 2024-02-09 18:34:44.610 [INFO][3763] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.193/26] IPv6=[] ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" HandleID="k8s-pod-network.c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.612 [INFO][3752] k8s.go 385: Populated endpoint ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1603f8c7-df14-4b1d-9532-c95bd3f20548", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"coredns-5dd5756b68-c8w8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali320f615b76e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.612 [INFO][3752] k8s.go 386: Calico CNI using IPs: [192.168.96.193/32] ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.612 [INFO][3752] dataplane_linux.go 68: Setting the host side veth name to cali320f615b76e ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.633 [INFO][3752] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.640 [INFO][3752] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1603f8c7-df14-4b1d-9532-c95bd3f20548", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74", Pod:"coredns-5dd5756b68-c8w8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali320f615b76e", MAC:"5a:51:8a:7f:2f:e3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:44.653537 env[1356]: 2024-02-09 18:34:44.651 [INFO][3752] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74" Namespace="kube-system" Pod="coredns-5dd5756b68-c8w8g" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:44.674000 audit[3783]: NETFILTER_CFG table=filter:106 family=2 entries=36 op=nft_register_chain pid=3783 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:44.674000 audit[3783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffe372d260 a2=0 a3=ffff9d169fa8 items=0 ppid=3530 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:44.855452 env[1356]: time="2024-02-09T18:34:44.855372626Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:44.855675 env[1356]: time="2024-02-09T18:34:44.855463734Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:44.855675 env[1356]: time="2024-02-09T18:34:44.855490890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:44.855893 env[1356]: time="2024-02-09T18:34:44.855836965Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74 pid=3792 runtime=io.containerd.runc.v2 Feb 9 18:34:44.877465 systemd[1]: Started cri-containerd-c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74.scope. Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.893000 audit: BPF prog-id=149 op=LOAD Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3792 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363331313961393735366336326633636333323739313036356336 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3792 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363331313961393735366336326633636333323739313036356336 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.894000 audit: BPF prog-id=150 op=LOAD Feb 9 18:34:44.894000 audit[3801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3792 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363331313961393735366336326633636333323739313036356336 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit: BPF prog-id=151 op=LOAD Feb 9 18:34:44.895000 audit[3801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3792 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363331313961393735366336326633636333323739313036356336 Feb 9 18:34:44.895000 audit: BPF prog-id=151 op=UNLOAD Feb 9 18:34:44.895000 audit: BPF prog-id=150 op=UNLOAD Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:44.895000 audit: BPF prog-id=152 op=LOAD Feb 9 18:34:44.895000 audit[3801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3792 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:44.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363331313961393735366336326633636333323739313036356336 Feb 9 18:34:45.013049 env[1356]: time="2024-02-09T18:34:45.013000069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-c8w8g,Uid:1603f8c7-df14-4b1d-9532-c95bd3f20548,Namespace:kube-system,Attempt:1,} returns sandbox id \"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74\"" Feb 9 18:34:45.016378 env[1356]: time="2024-02-09T18:34:45.016339194Z" level=info msg="CreateContainer within sandbox \"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:34:45.366439 env[1356]: time="2024-02-09T18:34:45.366390401Z" level=info msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" Feb 9 18:34:45.367228 env[1356]: time="2024-02-09T18:34:45.366770672Z" level=info msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" Feb 9 18:34:45.454075 systemd[1]: run-containerd-runc-k8s.io-c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74-runc.4WXOtL.mount: Deactivated successfully. Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.422 [INFO][3857] k8s.go 578: Cleaning up netns ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.422 [INFO][3857] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" iface="eth0" netns="/var/run/netns/cni-28a15672-5a32-ebca-5fb9-609ab9fffa8d" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.422 [INFO][3857] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" iface="eth0" netns="/var/run/netns/cni-28a15672-5a32-ebca-5fb9-609ab9fffa8d" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.423 [INFO][3857] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" iface="eth0" netns="/var/run/netns/cni-28a15672-5a32-ebca-5fb9-609ab9fffa8d" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.423 [INFO][3857] k8s.go 585: Releasing IP address(es) ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.423 [INFO][3857] utils.go 188: Calico CNI releasing IP address ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.458 [INFO][3868] ipam_plugin.go 415: Releasing address using handleID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.458 [INFO][3868] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.458 [INFO][3868] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.470 [WARNING][3868] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.470 [INFO][3868] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.472 [INFO][3868] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:45.477852 env[1356]: 2024-02-09 18:34:45.474 [INFO][3857] k8s.go 591: Teardown processing complete. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:45.480601 systemd[1]: run-netns-cni\x2d28a15672\x2d5a32\x2debca\x2d5fb9\x2d609ab9fffa8d.mount: Deactivated successfully. Feb 9 18:34:45.481473 env[1356]: time="2024-02-09T18:34:45.481435190Z" level=info msg="TearDown network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" successfully" Feb 9 18:34:45.481556 env[1356]: time="2024-02-09T18:34:45.481539937Z" level=info msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" returns successfully" Feb 9 18:34:45.482520 env[1356]: time="2024-02-09T18:34:45.482491813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-llbv6,Uid:04ff6cb3-572d-43b5-899a-f3fe2cdb4af9,Namespace:calico-system,Attempt:1,}" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.439 [INFO][3858] k8s.go 578: Cleaning up netns ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.440 [INFO][3858] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" iface="eth0" netns="/var/run/netns/cni-79803879-563a-2952-1725-ddda853566c6" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.440 [INFO][3858] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" iface="eth0" netns="/var/run/netns/cni-79803879-563a-2952-1725-ddda853566c6" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.440 [INFO][3858] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" iface="eth0" netns="/var/run/netns/cni-79803879-563a-2952-1725-ddda853566c6" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.440 [INFO][3858] k8s.go 585: Releasing IP address(es) ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.440 [INFO][3858] utils.go 188: Calico CNI releasing IP address ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.487 [INFO][3873] ipam_plugin.go 415: Releasing address using handleID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.487 [INFO][3873] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.487 [INFO][3873] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.498 [WARNING][3873] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.498 [INFO][3873] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.499 [INFO][3873] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:45.502240 env[1356]: 2024-02-09 18:34:45.501 [INFO][3858] k8s.go 591: Teardown processing complete. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:45.506580 env[1356]: time="2024-02-09T18:34:45.505393592Z" level=info msg="TearDown network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" successfully" Feb 9 18:34:45.506580 env[1356]: time="2024-02-09T18:34:45.505436787Z" level=info msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" returns successfully" Feb 9 18:34:45.506038 systemd[1]: run-netns-cni\x2d79803879\x2d563a\x2d2952\x2d1725\x2dddda853566c6.mount: Deactivated successfully. Feb 9 18:34:45.507021 env[1356]: time="2024-02-09T18:34:45.506994824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79b7b4c578-7ccp5,Uid:11e6a030-b3b1-433f-a224-a0d71eb104cb,Namespace:calico-system,Attempt:1,}" Feb 9 18:34:45.772405 systemd-networkd[1504]: vxlan.calico: Gained IPv6LL Feb 9 18:34:45.815742 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4102687814.mount: Deactivated successfully. Feb 9 18:34:45.833155 env[1356]: time="2024-02-09T18:34:45.833096468Z" level=info msg="CreateContainer within sandbox \"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"105940904a4b354fe0377c58981e0638bf45a3fca5c621f780214a558dc9a3eb\"" Feb 9 18:34:45.834090 env[1356]: time="2024-02-09T18:34:45.834063382Z" level=info msg="StartContainer for \"105940904a4b354fe0377c58981e0638bf45a3fca5c621f780214a558dc9a3eb\"" Feb 9 18:34:45.852386 systemd[1]: Started cri-containerd-105940904a4b354fe0377c58981e0638bf45a3fca5c621f780214a558dc9a3eb.scope. Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.884452 kernel: kauditd_printk_skb: 189 callbacks suppressed Feb 9 18:34:45.884512 kernel: audit: type=1400 audit(1707503685.877:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.927911 kernel: audit: type=1400 audit(1707503685.877:1156): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.951492 kernel: audit: type=1400 audit(1707503685.877:1157): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.978928 kernel: audit: type=1400 audit(1707503685.877:1158): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.001710 kernel: audit: type=1400 audit(1707503685.877:1159): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.024359 kernel: audit: type=1400 audit(1707503685.877:1160): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.047736 kernel: audit: type=1400 audit(1707503685.877:1161): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.093612 kernel: audit: type=1400 audit(1707503685.877:1162): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.093692 kernel: audit: type=1400 audit(1707503685.877:1163): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.093723 kernel: audit: type=1400 audit(1707503685.877:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.093900 systemd-networkd[1504]: cali320f615b76e: Gained IPv6LL Feb 9 18:34:46.115166 env[1356]: time="2024-02-09T18:34:46.115110236Z" level=info msg="StartContainer for \"105940904a4b354fe0377c58981e0638bf45a3fca5c621f780214a558dc9a3eb\" returns successfully" Feb 9 18:34:45.877000 audit: BPF prog-id=153 op=LOAD Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3792 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:45.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353934303930346134623335346665303337376335383938316530 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3792 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:45.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353934303930346134623335346665303337376335383938316530 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit: BPF prog-id=154 op=LOAD Feb 9 18:34:45.905000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3792 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:45.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353934303930346134623335346665303337376335383938316530 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit: BPF prog-id=155 op=LOAD Feb 9 18:34:45.905000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3792 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:45.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353934303930346134623335346665303337376335383938316530 Feb 9 18:34:45.905000 audit: BPF prog-id=155 op=UNLOAD Feb 9 18:34:45.905000 audit: BPF prog-id=154 op=UNLOAD Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:45.905000 audit: BPF prog-id=156 op=LOAD Feb 9 18:34:45.905000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3792 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:45.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130353934303930346134623335346665303337376335383938316530 Feb 9 18:34:46.220037 systemd-networkd[1504]: calide5017c8d92: Link UP Feb 9 18:34:46.235767 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:34:46.235896 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide5017c8d92: link becomes ready Feb 9 18:34:46.238901 systemd-networkd[1504]: calide5017c8d92: Gained carrier Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.030 [INFO][3919] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0 calico-kube-controllers-79b7b4c578- calico-system 11e6a030-b3b1-433f-a224-a0d71eb104cb 711 0 2024-02-09 18:34:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79b7b4c578 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 calico-kube-controllers-79b7b4c578-7ccp5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calide5017c8d92 [] []}} ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.030 [INFO][3919] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.154 [INFO][3943] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" HandleID="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.176 [INFO][3943] ipam_plugin.go 268: Auto assigning IP ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" HandleID="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b8f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"calico-kube-controllers-79b7b4c578-7ccp5", "timestamp":"2024-02-09 18:34:46.152790994 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.176 [INFO][3943] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.176 [INFO][3943] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.176 [INFO][3943] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.178 [INFO][3943] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.181 [INFO][3943] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.194 [INFO][3943] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.197 [INFO][3943] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.199 [INFO][3943] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.199 [INFO][3943] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.200 [INFO][3943] ipam.go 1682: Creating new handle: k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2 Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.204 [INFO][3943] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.214 [INFO][3943] ipam.go 1216: Successfully claimed IPs: [192.168.96.194/26] block=192.168.96.192/26 handle="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.214 [INFO][3943] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.194/26] handle="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.214 [INFO][3943] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:46.252670 env[1356]: 2024-02-09 18:34:46.214 [INFO][3943] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.194/26] IPv6=[] ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" HandleID="k8s-pod-network.443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.216 [INFO][3919] k8s.go 385: Populated endpoint ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0", GenerateName:"calico-kube-controllers-79b7b4c578-", Namespace:"calico-system", SelfLink:"", UID:"11e6a030-b3b1-433f-a224-a0d71eb104cb", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79b7b4c578", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"calico-kube-controllers-79b7b4c578-7ccp5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.96.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calide5017c8d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.216 [INFO][3919] k8s.go 386: Calico CNI using IPs: [192.168.96.194/32] ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.216 [INFO][3919] dataplane_linux.go 68: Setting the host side veth name to calide5017c8d92 ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.238 [INFO][3919] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.239 [INFO][3919] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0", GenerateName:"calico-kube-controllers-79b7b4c578-", Namespace:"calico-system", SelfLink:"", UID:"11e6a030-b3b1-433f-a224-a0d71eb104cb", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79b7b4c578", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2", Pod:"calico-kube-controllers-79b7b4c578-7ccp5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.96.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calide5017c8d92", MAC:"ce:82:5b:7d:a2:6f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:46.253312 env[1356]: 2024-02-09 18:34:46.251 [INFO][3919] k8s.go 491: Wrote updated endpoint to datastore ContainerID="443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2" Namespace="calico-system" Pod="calico-kube-controllers-79b7b4c578-7ccp5" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:46.270168 env[1356]: time="2024-02-09T18:34:46.270087722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:46.270445 env[1356]: time="2024-02-09T18:34:46.270407401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:46.270563 env[1356]: time="2024-02-09T18:34:46.270540384Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:46.270817 env[1356]: time="2024-02-09T18:34:46.270786752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2 pid=3978 runtime=io.containerd.runc.v2 Feb 9 18:34:46.286088 systemd-networkd[1504]: cali1e9b60cdd84: Link UP Feb 9 18:34:46.302555 systemd-networkd[1504]: cali1e9b60cdd84: Gained carrier Feb 9 18:34:46.303253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e9b60cdd84: link becomes ready Feb 9 18:34:46.317701 systemd[1]: Started cri-containerd-443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2.scope. Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.031 [INFO][3907] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0 csi-node-driver- calico-system 04ff6cb3-572d-43b5-899a-f3fe2cdb4af9 710 0 2024-02-09 18:34:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 csi-node-driver-llbv6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali1e9b60cdd84 [] []}} ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.031 [INFO][3907] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.181 [INFO][3947] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" HandleID="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.194 [INFO][3947] ipam_plugin.go 268: Auto assigning IP ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" HandleID="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025e700), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"csi-node-driver-llbv6", "timestamp":"2024-02-09 18:34:46.181176707 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.194 [INFO][3947] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.214 [INFO][3947] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.214 [INFO][3947] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.221 [INFO][3947] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.233 [INFO][3947] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.244 [INFO][3947] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.246 [INFO][3947] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.257 [INFO][3947] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.257 [INFO][3947] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.263 [INFO][3947] ipam.go 1682: Creating new handle: k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3 Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.270 [INFO][3947] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.277 [INFO][3947] ipam.go 1216: Successfully claimed IPs: [192.168.96.195/26] block=192.168.96.192/26 handle="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.277 [INFO][3947] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.195/26] handle="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.277 [INFO][3947] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:46.325455 env[1356]: 2024-02-09 18:34:46.277 [INFO][3947] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.195/26] IPv6=[] ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" HandleID="k8s-pod-network.4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.279 [INFO][3907] k8s.go 385: Populated endpoint ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"csi-node-driver-llbv6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.96.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e9b60cdd84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.279 [INFO][3907] k8s.go 386: Calico CNI using IPs: [192.168.96.195/32] ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.279 [INFO][3907] dataplane_linux.go 68: Setting the host side veth name to cali1e9b60cdd84 ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.303 [INFO][3907] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.303 [INFO][3907] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3", Pod:"csi-node-driver-llbv6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.96.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e9b60cdd84", MAC:"c6:91:de:cc:f1:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:46.326104 env[1356]: 2024-02-09 18:34:46.323 [INFO][3907] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3" Namespace="calico-system" Pod="csi-node-driver-llbv6" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:46.342411 env[1356]: time="2024-02-09T18:34:46.342343277Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:46.342633 env[1356]: time="2024-02-09T18:34:46.342607323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:46.342745 env[1356]: time="2024-02-09T18:34:46.342723828Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:46.343006 env[1356]: time="2024-02-09T18:34:46.342974836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3 pid=4024 runtime=io.containerd.runc.v2 Feb 9 18:34:46.362000 audit[4048]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:46.362000 audit[4048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffff6b53730 a2=0 a3=ffff987d3fa8 items=0 ppid=3530 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.362000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:46.364871 systemd[1]: Started cri-containerd-4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3.scope. Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.378000 audit: BPF prog-id=157 op=LOAD Feb 9 18:34:46.379000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.379000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3978 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434336331353366636339633633303964633035646133653836303362 Feb 9 18:34:46.379000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.379000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3978 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434336331353366636339633633303964633035646133653836303362 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit: BPF prog-id=158 op=LOAD Feb 9 18:34:46.380000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3978 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434336331353366636339633633303964633035646133653836303362 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.380000 audit: BPF prog-id=159 op=LOAD Feb 9 18:34:46.380000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3978 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434336331353366636339633633303964633035646133653836303362 Feb 9 18:34:46.381000 audit: BPF prog-id=159 op=UNLOAD Feb 9 18:34:46.381000 audit: BPF prog-id=158 op=UNLOAD Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.381000 audit: BPF prog-id=160 op=LOAD Feb 9 18:34:46.381000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3978 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434336331353366636339633633303964633035646133653836303362 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.392000 audit: BPF prog-id=161 op=LOAD Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643662333431376237626436323361396366316466386334633730 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643662333431376237626436323361396366316466386334633730 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.393000 audit: BPF prog-id=162 op=LOAD Feb 9 18:34:46.393000 audit[4036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643662333431376237626436323361396366316466386334633730 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.394000 audit: BPF prog-id=163 op=LOAD Feb 9 18:34:46.394000 audit[4036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643662333431376237626436323361396366316466386334633730 Feb 9 18:34:46.395000 audit: BPF prog-id=163 op=UNLOAD Feb 9 18:34:46.395000 audit: BPF prog-id=162 op=UNLOAD Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:46.395000 audit: BPF prog-id=164 op=LOAD Feb 9 18:34:46.395000 audit[4036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643662333431376237626436323361396366316466386334633730 Feb 9 18:34:46.406000 audit[4061]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4061 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:46.406000 audit[4061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19508 a0=3 a1=fffff8930570 a2=0 a3=ffffb62fafa8 items=0 ppid=3530 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.406000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:46.416696 env[1356]: time="2024-02-09T18:34:46.416654808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-llbv6,Uid:04ff6cb3-572d-43b5-899a-f3fe2cdb4af9,Namespace:calico-system,Attempt:1,} returns sandbox id \"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3\"" Feb 9 18:34:46.419183 env[1356]: time="2024-02-09T18:34:46.419150688Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:34:46.427229 env[1356]: time="2024-02-09T18:34:46.427161138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79b7b4c578-7ccp5,Uid:11e6a030-b3b1-433f-a224-a0d71eb104cb,Namespace:calico-system,Attempt:1,} returns sandbox id \"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2\"" Feb 9 18:34:46.615722 kubelet[2458]: I0209 18:34:46.615671 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-c8w8g" podStartSLOduration=34.615622082 podCreationTimestamp="2024-02-09 18:34:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:46.596871771 +0000 UTC m=+47.353190571" watchObservedRunningTime="2024-02-09 18:34:46.615622082 +0000 UTC m=+47.371940882" Feb 9 18:34:46.628000 audit[4075]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.628000 audit[4075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd92d9de0 a2=0 a3=ffff916836c0 items=0 ppid=2593 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.629000 audit[4075]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.629000 audit[4075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffd92d9de0 a2=0 a3=ffff916836c0 items=0 ppid=2593 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.645000 audit[4077]: NETFILTER_CFG table=filter:111 family=2 entries=11 op=nft_register_rule pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.645000 audit[4077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcb16c8a0 a2=0 a3=ffff9a7206c0 items=0 ppid=2593 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:46.647000 audit[4077]: NETFILTER_CFG table=nat:112 family=2 entries=35 op=nft_register_chain pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:46.647000 audit[4077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffcb16c8a0 a2=0 a3=ffff9a7206c0 items=0 ppid=2593 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:46.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:47.564372 systemd-networkd[1504]: calide5017c8d92: Gained IPv6LL Feb 9 18:34:47.820349 systemd-networkd[1504]: cali1e9b60cdd84: Gained IPv6LL Feb 9 18:34:47.886969 env[1356]: time="2024-02-09T18:34:47.886925244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:47.893476 env[1356]: time="2024-02-09T18:34:47.893435978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:47.898037 env[1356]: time="2024-02-09T18:34:47.898000439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:47.902418 env[1356]: time="2024-02-09T18:34:47.902382403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:47.903030 env[1356]: time="2024-02-09T18:34:47.903005723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 18:34:47.906242 env[1356]: time="2024-02-09T18:34:47.906193559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 18:34:47.907464 env[1356]: time="2024-02-09T18:34:47.907191832Z" level=info msg="CreateContainer within sandbox \"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:34:47.937058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount45989423.mount: Deactivated successfully. Feb 9 18:34:47.953013 env[1356]: time="2024-02-09T18:34:47.952959424Z" level=info msg="CreateContainer within sandbox \"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"36152caef16d1a668bd5de162661052bbb60de93fd73858a4a178b0754fec576\"" Feb 9 18:34:47.955187 env[1356]: time="2024-02-09T18:34:47.953722447Z" level=info msg="StartContainer for \"36152caef16d1a668bd5de162661052bbb60de93fd73858a4a178b0754fec576\"" Feb 9 18:34:47.974663 systemd[1]: Started cri-containerd-36152caef16d1a668bd5de162661052bbb60de93fd73858a4a178b0754fec576.scope. Feb 9 18:34:47.981182 systemd[1]: run-containerd-runc-k8s.io-36152caef16d1a668bd5de162661052bbb60de93fd73858a4a178b0754fec576-runc.GzlSJN.mount: Deactivated successfully. Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4024 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:47.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336313532636165663136643161363638626435646531363236363130 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.998000 audit: BPF prog-id=165 op=LOAD Feb 9 18:34:47.998000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4024 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:47.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336313532636165663136643161363638626435646531363236363130 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:47.999000 audit: BPF prog-id=166 op=LOAD Feb 9 18:34:47.999000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4024 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:47.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336313532636165663136643161363638626435646531363236363130 Feb 9 18:34:47.999000 audit: BPF prog-id=166 op=UNLOAD Feb 9 18:34:48.000000 audit: BPF prog-id=165 op=UNLOAD Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:48.000000 audit: BPF prog-id=167 op=LOAD Feb 9 18:34:48.000000 audit[4086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4024 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:48.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336313532636165663136643161363638626435646531363236363130 Feb 9 18:34:48.020352 env[1356]: time="2024-02-09T18:34:48.020306466Z" level=info msg="StartContainer for \"36152caef16d1a668bd5de162661052bbb60de93fd73858a4a178b0754fec576\" returns successfully" Feb 9 18:34:49.369390 env[1356]: time="2024-02-09T18:34:49.369351911Z" level=info msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.443 [INFO][4132] k8s.go 578: Cleaning up netns ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.444 [INFO][4132] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" iface="eth0" netns="/var/run/netns/cni-06c333b9-eaa0-14e3-c282-423215c5fe49" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.444 [INFO][4132] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" iface="eth0" netns="/var/run/netns/cni-06c333b9-eaa0-14e3-c282-423215c5fe49" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.444 [INFO][4132] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" iface="eth0" netns="/var/run/netns/cni-06c333b9-eaa0-14e3-c282-423215c5fe49" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.444 [INFO][4132] k8s.go 585: Releasing IP address(es) ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.444 [INFO][4132] utils.go 188: Calico CNI releasing IP address ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.470 [INFO][4139] ipam_plugin.go 415: Releasing address using handleID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.470 [INFO][4139] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.470 [INFO][4139] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.489 [WARNING][4139] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.489 [INFO][4139] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.490 [INFO][4139] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:49.493326 env[1356]: 2024-02-09 18:34:49.492 [INFO][4132] k8s.go 591: Teardown processing complete. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:49.495991 systemd[1]: run-netns-cni\x2d06c333b9\x2deaa0\x2d14e3\x2dc282\x2d423215c5fe49.mount: Deactivated successfully. Feb 9 18:34:49.496887 env[1356]: time="2024-02-09T18:34:49.496846635Z" level=info msg="TearDown network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" successfully" Feb 9 18:34:49.496998 env[1356]: time="2024-02-09T18:34:49.496980379Z" level=info msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" returns successfully" Feb 9 18:34:49.497925 env[1356]: time="2024-02-09T18:34:49.497889746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wjrh2,Uid:a4b2c988-42e7-43af-8eae-10692f5156e6,Namespace:kube-system,Attempt:1,}" Feb 9 18:34:49.698921 systemd-networkd[1504]: cali57b7e016c60: Link UP Feb 9 18:34:49.720509 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:34:49.720644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali57b7e016c60: link becomes ready Feb 9 18:34:49.723131 systemd-networkd[1504]: cali57b7e016c60: Gained carrier Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.603 [INFO][4146] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0 coredns-5dd5756b68- kube-system a4b2c988-42e7-43af-8eae-10692f5156e6 743 0 2024-02-09 18:34:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 coredns-5dd5756b68-wjrh2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali57b7e016c60 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.603 [INFO][4146] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.645 [INFO][4158] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" HandleID="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.657 [INFO][4158] ipam_plugin.go 268: Auto assigning IP ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" HandleID="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b27c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"coredns-5dd5756b68-wjrh2", "timestamp":"2024-02-09 18:34:49.645297404 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.657 [INFO][4158] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.657 [INFO][4158] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.657 [INFO][4158] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.659 [INFO][4158] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.662 [INFO][4158] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.667 [INFO][4158] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.669 [INFO][4158] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.673 [INFO][4158] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.673 [INFO][4158] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.676 [INFO][4158] ipam.go 1682: Creating new handle: k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.683 [INFO][4158] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.691 [INFO][4158] ipam.go 1216: Successfully claimed IPs: [192.168.96.196/26] block=192.168.96.192/26 handle="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.691 [INFO][4158] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.196/26] handle="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.691 [INFO][4158] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:49.739644 env[1356]: 2024-02-09 18:34:49.691 [INFO][4158] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.196/26] IPv6=[] ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" HandleID="k8s-pod-network.d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.693 [INFO][4146] k8s.go 385: Populated endpoint ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a4b2c988-42e7-43af-8eae-10692f5156e6", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"coredns-5dd5756b68-wjrh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali57b7e016c60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.693 [INFO][4146] k8s.go 386: Calico CNI using IPs: [192.168.96.196/32] ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.693 [INFO][4146] dataplane_linux.go 68: Setting the host side veth name to cali57b7e016c60 ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.724 [INFO][4146] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.725 [INFO][4146] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a4b2c988-42e7-43af-8eae-10692f5156e6", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed", Pod:"coredns-5dd5756b68-wjrh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali57b7e016c60", MAC:"4a:45:5f:df:a4:0a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:49.740305 env[1356]: 2024-02-09 18:34:49.737 [INFO][4146] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed" Namespace="kube-system" Pod="coredns-5dd5756b68-wjrh2" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:49.767243 env[1356]: time="2024-02-09T18:34:49.767157346Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:34:49.767455 env[1356]: time="2024-02-09T18:34:49.767423273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:34:49.767556 env[1356]: time="2024-02-09T18:34:49.767528300Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:34:49.768749 env[1356]: time="2024-02-09T18:34:49.767827863Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed pid=4186 runtime=io.containerd.runc.v2 Feb 9 18:34:49.783665 systemd[1]: Started cri-containerd-d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed.scope. Feb 9 18:34:49.789000 audit[4202]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:34:49.789000 audit[4202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=ffffd47b91e0 a2=0 a3=ffff88560fa8 items=0 ppid=3530 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.789000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit: BPF prog-id=168 op=LOAD Feb 9 18:34:49.799000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4186 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653634383338383661346163383235633830383037363633633834 Feb 9 18:34:49.799000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.799000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4186 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653634383338383661346163383235633830383037363633633834 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit: BPF prog-id=169 op=LOAD Feb 9 18:34:49.800000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4186 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653634383338383661346163383235633830383037363633633834 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit: BPF prog-id=170 op=LOAD Feb 9 18:34:49.800000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4186 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653634383338383661346163383235633830383037363633633834 Feb 9 18:34:49.800000 audit: BPF prog-id=170 op=UNLOAD Feb 9 18:34:49.800000 audit: BPF prog-id=169 op=UNLOAD Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.800000 audit: BPF prog-id=171 op=LOAD Feb 9 18:34:49.800000 audit[4196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4186 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431653634383338383661346163383235633830383037363633633834 Feb 9 18:34:49.825987 env[1356]: time="2024-02-09T18:34:49.825934624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wjrh2,Uid:a4b2c988-42e7-43af-8eae-10692f5156e6,Namespace:kube-system,Attempt:1,} returns sandbox id \"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed\"" Feb 9 18:34:49.832173 env[1356]: time="2024-02-09T18:34:49.831702469Z" level=info msg="CreateContainer within sandbox \"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:34:49.901115 env[1356]: time="2024-02-09T18:34:49.901068475Z" level=info msg="CreateContainer within sandbox \"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"996263b88475ba39351e744abc71b89319209a8bc246bd626c71811a83be6795\"" Feb 9 18:34:49.902119 env[1356]: time="2024-02-09T18:34:49.902081070Z" level=info msg="StartContainer for \"996263b88475ba39351e744abc71b89319209a8bc246bd626c71811a83be6795\"" Feb 9 18:34:49.921008 systemd[1]: Started cri-containerd-996263b88475ba39351e744abc71b89319209a8bc246bd626c71811a83be6795.scope. Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.957000 audit: BPF prog-id=172 op=LOAD Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4186 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363236336238383437356261333933353165373434616263373162 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4186 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363236336238383437356261333933353165373434616263373162 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit: BPF prog-id=173 op=LOAD Feb 9 18:34:49.958000 audit[4227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4186 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363236336238383437356261333933353165373434616263373162 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit: BPF prog-id=174 op=LOAD Feb 9 18:34:49.958000 audit[4227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4186 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363236336238383437356261333933353165373434616263373162 Feb 9 18:34:49.958000 audit: BPF prog-id=174 op=UNLOAD Feb 9 18:34:49.958000 audit: BPF prog-id=173 op=UNLOAD Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:49.958000 audit: BPF prog-id=175 op=LOAD Feb 9 18:34:49.958000 audit[4227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4186 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363236336238383437356261333933353165373434616263373162 Feb 9 18:34:49.979653 env[1356]: time="2024-02-09T18:34:49.978453488Z" level=info msg="StartContainer for \"996263b88475ba39351e744abc71b89319209a8bc246bd626c71811a83be6795\" returns successfully" Feb 9 18:34:50.533290 env[1356]: time="2024-02-09T18:34:50.533237201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:50.539984 env[1356]: time="2024-02-09T18:34:50.539933341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:50.547694 env[1356]: time="2024-02-09T18:34:50.547645476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:50.551918 env[1356]: time="2024-02-09T18:34:50.551856041Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:50.552498 env[1356]: time="2024-02-09T18:34:50.552462327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 18:34:50.553659 env[1356]: time="2024-02-09T18:34:50.553260949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:34:50.575341 env[1356]: time="2024-02-09T18:34:50.575294771Z" level=info msg="CreateContainer within sandbox \"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 18:34:50.608360 kubelet[2458]: I0209 18:34:50.607993 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-wjrh2" podStartSLOduration=38.607955571 podCreationTimestamp="2024-02-09 18:34:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:34:50.607837586 +0000 UTC m=+51.364156386" watchObservedRunningTime="2024-02-09 18:34:50.607955571 +0000 UTC m=+51.364274371" Feb 9 18:34:50.628173 env[1356]: time="2024-02-09T18:34:50.628094425Z" level=info msg="CreateContainer within sandbox \"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8\"" Feb 9 18:34:50.629023 env[1356]: time="2024-02-09T18:34:50.628969238Z" level=info msg="StartContainer for \"f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8\"" Feb 9 18:34:50.658540 systemd[1]: Started cri-containerd-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8.scope. Feb 9 18:34:50.667000 audit[4274]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:50.667000 audit[4274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffef14cb60 a2=0 a3=ffffba3f66c0 items=0 ppid=2593 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:50.670000 audit[4274]: NETFILTER_CFG table=nat:115 family=2 entries=44 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:50.670000 audit[4274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffef14cb60 a2=0 a3=ffffba3f66c0 items=0 ppid=2593 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.684000 audit: BPF prog-id=176 op=LOAD Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3978 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656266333432373064653063663736393035623266633131363933 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3978 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656266333432373064653063663736393035623266633131363933 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.685000 audit: BPF prog-id=177 op=LOAD Feb 9 18:34:50.685000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3978 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656266333432373064653063663736393035623266633131363933 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.686000 audit: BPF prog-id=178 op=LOAD Feb 9 18:34:50.686000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3978 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656266333432373064653063663736393035623266633131363933 Feb 9 18:34:50.687000 audit: BPF prog-id=178 op=UNLOAD Feb 9 18:34:50.687000 audit: BPF prog-id=177 op=UNLOAD Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4284]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:50.687000 audit[4284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff20c9d80 a2=0 a3=ffffbd53d6c0 items=0 ppid=2593 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:50.687000 audit: BPF prog-id=179 op=LOAD Feb 9 18:34:50.687000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3978 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637656266333432373064653063663736393035623266633131363933 Feb 9 18:34:50.722822 env[1356]: time="2024-02-09T18:34:50.722771552Z" level=info msg="StartContainer for \"f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8\" returns successfully" Feb 9 18:34:50.742000 audit[4284]: NETFILTER_CFG table=nat:117 family=2 entries=56 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:34:50.742000 audit[4284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=fffff20c9d80 a2=0 a3=ffffbd53d6c0 items=0 ppid=2593 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:50.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:34:51.532875 systemd-networkd[1504]: cali57b7e016c60: Gained IPv6LL Feb 9 18:34:51.630943 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.HqY4ll.mount: Deactivated successfully. Feb 9 18:34:51.688164 kubelet[2458]: I0209 18:34:51.688119 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79b7b4c578-7ccp5" podStartSLOduration=28.564295439 podCreationTimestamp="2024-02-09 18:34:19 +0000 UTC" firstStartedPulling="2024-02-09 18:34:46.429161481 +0000 UTC m=+47.185480281" lastFinishedPulling="2024-02-09 18:34:50.552930989 +0000 UTC m=+51.309249789" observedRunningTime="2024-02-09 18:34:51.624004382 +0000 UTC m=+52.380323142" watchObservedRunningTime="2024-02-09 18:34:51.688064947 +0000 UTC m=+52.444383747" Feb 9 18:34:52.174700 env[1356]: time="2024-02-09T18:34:52.174642198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:52.182619 env[1356]: time="2024-02-09T18:34:52.182573728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:52.189506 env[1356]: time="2024-02-09T18:34:52.189455784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:52.194481 env[1356]: time="2024-02-09T18:34:52.194436348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:34:52.195082 env[1356]: time="2024-02-09T18:34:52.195044835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 18:34:52.198004 env[1356]: time="2024-02-09T18:34:52.197936529Z" level=info msg="CreateContainer within sandbox \"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:34:52.230144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2310149252.mount: Deactivated successfully. Feb 9 18:34:52.246889 env[1356]: time="2024-02-09T18:34:52.246825397Z" level=info msg="CreateContainer within sandbox \"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f86beb95289dc4cbfc6245c7440557410387400e7541a777367f64f5b4bf4d3e\"" Feb 9 18:34:52.247754 env[1356]: time="2024-02-09T18:34:52.247722569Z" level=info msg="StartContainer for \"f86beb95289dc4cbfc6245c7440557410387400e7541a777367f64f5b4bf4d3e\"" Feb 9 18:34:52.281436 systemd[1]: Started cri-containerd-f86beb95289dc4cbfc6245c7440557410387400e7541a777367f64f5b4bf4d3e.scope. Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.316508 kernel: kauditd_printk_skb: 408 callbacks suppressed Feb 9 18:34:52.316613 kernel: audit: type=1400 audit(1707503692.309:1280): avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4024 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366265623935323839646334636266633632343563373434303535 Feb 9 18:34:52.406540 kernel: audit: type=1300 audit(1707503692.309:1280): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4024 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.406698 kernel: audit: type=1327 audit(1707503692.309:1280): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366265623935323839646334636266633632343563373434303535 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.453954 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.454107 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.454691 env[1356]: time="2024-02-09T18:34:52.454641760Z" level=info msg="StartContainer for \"f86beb95289dc4cbfc6245c7440557410387400e7541a777367f64f5b4bf4d3e\" returns successfully" Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.474498 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.495151 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.506534 kubelet[2458]: I0209 18:34:52.506280 2458 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:34:52.506534 kubelet[2458]: I0209 18:34:52.506323 2458 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:34:52.517119 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.537580 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.559632 kernel: audit: type=1400 audit(1707503692.309:1281): avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.309000 audit: BPF prog-id=180 op=LOAD Feb 9 18:34:52.309000 audit[4323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4024 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366265623935323839646334636266633632343563373434303535 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.315000 audit: BPF prog-id=181 op=LOAD Feb 9 18:34:52.315000 audit[4323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4024 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366265623935323839646334636266633632343563373434303535 Feb 9 18:34:52.335000 audit: BPF prog-id=181 op=UNLOAD Feb 9 18:34:52.335000 audit: BPF prog-id=180 op=UNLOAD Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:34:52.335000 audit: BPF prog-id=182 op=LOAD Feb 9 18:34:52.335000 audit[4323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4024 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:34:52.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366265623935323839646334636266633632343563373434303535 Feb 9 18:34:52.618939 kubelet[2458]: I0209 18:34:52.618894 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-llbv6" podStartSLOduration=28.84178374 podCreationTimestamp="2024-02-09 18:34:18 +0000 UTC" firstStartedPulling="2024-02-09 18:34:46.418701385 +0000 UTC m=+47.175020185" lastFinishedPulling="2024-02-09 18:34:52.195765309 +0000 UTC m=+52.952084109" observedRunningTime="2024-02-09 18:34:52.61695497 +0000 UTC m=+53.373273770" watchObservedRunningTime="2024-02-09 18:34:52.618847664 +0000 UTC m=+53.375166464" Feb 9 18:34:53.227532 systemd[1]: run-containerd-runc-k8s.io-f86beb95289dc4cbfc6245c7440557410387400e7541a777367f64f5b4bf4d3e-runc.MsvxZH.mount: Deactivated successfully. Feb 9 18:34:55.801000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.801000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4012349290 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.812000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.812000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012349710 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.819000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.819000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40118d4da0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.833000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.833000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.833000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40118d4de0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.833000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4011eeac30 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.855000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.855000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4011eeacc0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:34:55.855000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:34:55.955000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.955000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011d0700 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:55.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:55.955000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:34:55.955000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d015c0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:34:55.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:34:59.390850 env[1356]: time="2024-02-09T18:34:59.390782865Z" level=info msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.427 [WARNING][4375] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3", Pod:"csi-node-driver-llbv6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.96.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e9b60cdd84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.427 [INFO][4375] k8s.go 578: Cleaning up netns ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.427 [INFO][4375] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" iface="eth0" netns="" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.427 [INFO][4375] k8s.go 585: Releasing IP address(es) ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.427 [INFO][4375] utils.go 188: Calico CNI releasing IP address ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.447 [INFO][4381] ipam_plugin.go 415: Releasing address using handleID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.448 [INFO][4381] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.448 [INFO][4381] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.457 [WARNING][4381] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.457 [INFO][4381] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.459 [INFO][4381] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.461228 env[1356]: 2024-02-09 18:34:59.460 [INFO][4375] k8s.go 591: Teardown processing complete. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.461711 env[1356]: time="2024-02-09T18:34:59.461258497Z" level=info msg="TearDown network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" successfully" Feb 9 18:34:59.461711 env[1356]: time="2024-02-09T18:34:59.461288734Z" level=info msg="StopPodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" returns successfully" Feb 9 18:34:59.461984 env[1356]: time="2024-02-09T18:34:59.461954940Z" level=info msg="RemovePodSandbox for \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" Feb 9 18:34:59.462079 env[1356]: time="2024-02-09T18:34:59.461992456Z" level=info msg="Forcibly stopping sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\"" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.500 [WARNING][4400] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"04ff6cb3-572d-43b5-899a-f3fe2cdb4af9", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"4dd6b3417b7bd623a9cf1df8c4c7052946f7ff7a6ad78eade26717714ea053a3", Pod:"csi-node-driver-llbv6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.96.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e9b60cdd84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.501 [INFO][4400] k8s.go 578: Cleaning up netns ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.501 [INFO][4400] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" iface="eth0" netns="" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.501 [INFO][4400] k8s.go 585: Releasing IP address(es) ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.501 [INFO][4400] utils.go 188: Calico CNI releasing IP address ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.528 [INFO][4406] ipam_plugin.go 415: Releasing address using handleID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.528 [INFO][4406] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.528 [INFO][4406] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.538 [WARNING][4406] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.538 [INFO][4406] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" HandleID="k8s-pod-network.0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-csi--node--driver--llbv6-eth0" Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.540 [INFO][4406] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.542847 env[1356]: 2024-02-09 18:34:59.541 [INFO][4400] k8s.go 591: Teardown processing complete. ContainerID="0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7" Feb 9 18:34:59.544029 env[1356]: time="2024-02-09T18:34:59.542889127Z" level=info msg="TearDown network for sandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" successfully" Feb 9 18:34:59.555670 env[1356]: time="2024-02-09T18:34:59.555563636Z" level=info msg="RemovePodSandbox \"0873afcd63e1e7df4c671d973caf65ed6f3dcc99756912b3728edfffc1961de7\" returns successfully" Feb 9 18:34:59.556317 env[1356]: time="2024-02-09T18:34:59.556284316Z" level=info msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.600 [WARNING][4424] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1603f8c7-df14-4b1d-9532-c95bd3f20548", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74", Pod:"coredns-5dd5756b68-c8w8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali320f615b76e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.600 [INFO][4424] k8s.go 578: Cleaning up netns ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.603 [INFO][4424] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" iface="eth0" netns="" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.603 [INFO][4424] k8s.go 585: Releasing IP address(es) ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.603 [INFO][4424] utils.go 188: Calico CNI releasing IP address ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.636 [INFO][4430] ipam_plugin.go 415: Releasing address using handleID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.636 [INFO][4430] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.636 [INFO][4430] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.645 [WARNING][4430] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.645 [INFO][4430] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.646 [INFO][4430] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.649636 env[1356]: 2024-02-09 18:34:59.647 [INFO][4424] k8s.go 591: Teardown processing complete. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.649636 env[1356]: time="2024-02-09T18:34:59.648850808Z" level=info msg="TearDown network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" successfully" Feb 9 18:34:59.649636 env[1356]: time="2024-02-09T18:34:59.648881284Z" level=info msg="StopPodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" returns successfully" Feb 9 18:34:59.650409 env[1356]: time="2024-02-09T18:34:59.650380318Z" level=info msg="RemovePodSandbox for \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" Feb 9 18:34:59.650638 env[1356]: time="2024-02-09T18:34:59.650600333Z" level=info msg="Forcibly stopping sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\"" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.691 [WARNING][4448] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1603f8c7-df14-4b1d-9532-c95bd3f20548", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"c763119a9756c62f3cc32791065c6600d5c913010c6ccc00d065325ad97f1c74", Pod:"coredns-5dd5756b68-c8w8g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali320f615b76e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.691 [INFO][4448] k8s.go 578: Cleaning up netns ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.691 [INFO][4448] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" iface="eth0" netns="" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.691 [INFO][4448] k8s.go 585: Releasing IP address(es) ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.691 [INFO][4448] utils.go 188: Calico CNI releasing IP address ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.714 [INFO][4455] ipam_plugin.go 415: Releasing address using handleID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.714 [INFO][4455] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.714 [INFO][4455] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.725 [WARNING][4455] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.725 [INFO][4455] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" HandleID="k8s-pod-network.5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--c8w8g-eth0" Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.726 [INFO][4455] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.728840 env[1356]: 2024-02-09 18:34:59.727 [INFO][4448] k8s.go 591: Teardown processing complete. ContainerID="5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374" Feb 9 18:34:59.729398 env[1356]: time="2024-02-09T18:34:59.729363602Z" level=info msg="TearDown network for sandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" successfully" Feb 9 18:34:59.740134 env[1356]: time="2024-02-09T18:34:59.740090888Z" level=info msg="RemovePodSandbox \"5550c2fe8fc49a2212e81dd765d77a76156364518e7420be79c3728784b19374\" returns successfully" Feb 9 18:34:59.740864 env[1356]: time="2024-02-09T18:34:59.740840524Z" level=info msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.776 [WARNING][4473] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0", GenerateName:"calico-kube-controllers-79b7b4c578-", Namespace:"calico-system", SelfLink:"", UID:"11e6a030-b3b1-433f-a224-a0d71eb104cb", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79b7b4c578", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2", Pod:"calico-kube-controllers-79b7b4c578-7ccp5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.96.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calide5017c8d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.776 [INFO][4473] k8s.go 578: Cleaning up netns ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.776 [INFO][4473] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" iface="eth0" netns="" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.776 [INFO][4473] k8s.go 585: Releasing IP address(es) ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.776 [INFO][4473] utils.go 188: Calico CNI releasing IP address ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.794 [INFO][4480] ipam_plugin.go 415: Releasing address using handleID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.794 [INFO][4480] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.794 [INFO][4480] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.803 [WARNING][4480] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.803 [INFO][4480] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.805 [INFO][4480] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.807335 env[1356]: 2024-02-09 18:34:59.806 [INFO][4473] k8s.go 591: Teardown processing complete. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.807793 env[1356]: time="2024-02-09T18:34:59.807393793Z" level=info msg="TearDown network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" successfully" Feb 9 18:34:59.807793 env[1356]: time="2024-02-09T18:34:59.807425110Z" level=info msg="StopPodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" returns successfully" Feb 9 18:34:59.808056 env[1356]: time="2024-02-09T18:34:59.808009565Z" level=info msg="RemovePodSandbox for \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" Feb 9 18:34:59.808107 env[1356]: time="2024-02-09T18:34:59.808063279Z" level=info msg="Forcibly stopping sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\"" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.852 [WARNING][4502] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0", GenerateName:"calico-kube-controllers-79b7b4c578-", Namespace:"calico-system", SelfLink:"", UID:"11e6a030-b3b1-433f-a224-a0d71eb104cb", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79b7b4c578", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"443c153fcc9c6309dc05da3e8603b47ddedd1c8311dd91b908b1051f010854a2", Pod:"calico-kube-controllers-79b7b4c578-7ccp5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.96.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calide5017c8d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.853 [INFO][4502] k8s.go 578: Cleaning up netns ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.853 [INFO][4502] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" iface="eth0" netns="" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.853 [INFO][4502] k8s.go 585: Releasing IP address(es) ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.853 [INFO][4502] utils.go 188: Calico CNI releasing IP address ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.871 [INFO][4508] ipam_plugin.go 415: Releasing address using handleID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.872 [INFO][4508] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.872 [INFO][4508] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.881 [WARNING][4508] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.881 [INFO][4508] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" HandleID="k8s-pod-network.0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--kube--controllers--79b7b4c578--7ccp5-eth0" Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.882 [INFO][4508] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.885040 env[1356]: 2024-02-09 18:34:59.884 [INFO][4502] k8s.go 591: Teardown processing complete. ContainerID="0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da" Feb 9 18:34:59.885685 env[1356]: time="2024-02-09T18:34:59.885646119Z" level=info msg="TearDown network for sandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" successfully" Feb 9 18:34:59.893014 env[1356]: time="2024-02-09T18:34:59.892969664Z" level=info msg="RemovePodSandbox \"0d9b2af4bc3fcaaec288de815c37749b47e31076ad574c0f1dba46ed533fb8da\" returns successfully" Feb 9 18:34:59.893753 env[1356]: time="2024-02-09T18:34:59.893725460Z" level=info msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.929 [WARNING][4526] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a4b2c988-42e7-43af-8eae-10692f5156e6", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed", Pod:"coredns-5dd5756b68-wjrh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali57b7e016c60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.930 [INFO][4526] k8s.go 578: Cleaning up netns ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.930 [INFO][4526] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" iface="eth0" netns="" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.930 [INFO][4526] k8s.go 585: Releasing IP address(es) ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.930 [INFO][4526] utils.go 188: Calico CNI releasing IP address ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.951 [INFO][4533] ipam_plugin.go 415: Releasing address using handleID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.951 [INFO][4533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.951 [INFO][4533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.961 [WARNING][4533] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.961 [INFO][4533] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.963 [INFO][4533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:34:59.966818 env[1356]: 2024-02-09 18:34:59.964 [INFO][4526] k8s.go 591: Teardown processing complete. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:34:59.967382 env[1356]: time="2024-02-09T18:34:59.967346861Z" level=info msg="TearDown network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" successfully" Feb 9 18:34:59.967461 env[1356]: time="2024-02-09T18:34:59.967444770Z" level=info msg="StopPodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" returns successfully" Feb 9 18:34:59.968095 env[1356]: time="2024-02-09T18:34:59.968067381Z" level=info msg="RemovePodSandbox for \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" Feb 9 18:34:59.968386 env[1356]: time="2024-02-09T18:34:59.968344670Z" level=info msg="Forcibly stopping sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\"" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.004 [WARNING][4551] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"a4b2c988-42e7-43af-8eae-10692f5156e6", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 34, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"d1e6483886a4ac825c80807663c84ec239d2cda2993456afb0cb609fca2329ed", Pod:"coredns-5dd5756b68-wjrh2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.96.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali57b7e016c60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.005 [INFO][4551] k8s.go 578: Cleaning up netns ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.005 [INFO][4551] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" iface="eth0" netns="" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.005 [INFO][4551] k8s.go 585: Releasing IP address(es) ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.005 [INFO][4551] utils.go 188: Calico CNI releasing IP address ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.025 [INFO][4558] ipam_plugin.go 415: Releasing address using handleID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.025 [INFO][4558] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.026 [INFO][4558] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.035 [WARNING][4558] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.035 [INFO][4558] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" HandleID="k8s-pod-network.dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-coredns--5dd5756b68--wjrh2-eth0" Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.036 [INFO][4558] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:00.038562 env[1356]: 2024-02-09 18:35:00.037 [INFO][4551] k8s.go 591: Teardown processing complete. ContainerID="dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993" Feb 9 18:35:00.039108 env[1356]: time="2024-02-09T18:35:00.039057676Z" level=info msg="TearDown network for sandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" successfully" Feb 9 18:35:00.050429 env[1356]: time="2024-02-09T18:35:00.050383466Z" level=info msg="RemovePodSandbox \"dd14162dfcdfe0e4fd59491ff63b834f8969aaa0107c23ca3c72d3f117609993\" returns successfully" Feb 9 18:35:00.128973 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.S61I7h.mount: Deactivated successfully. Feb 9 18:35:02.171161 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.SHT2Uh.mount: Deactivated successfully. Feb 9 18:35:03.037155 kubelet[2458]: I0209 18:35:03.037103 2458 topology_manager.go:215] "Topology Admit Handler" podUID="156e492a-6349-4b9a-9b44-d14a99446498" podNamespace="calico-apiserver" podName="calico-apiserver-7f4cff6486-t9kpx" Feb 9 18:35:03.043505 systemd[1]: Created slice kubepods-besteffort-pod156e492a_6349_4b9a_9b44_d14a99446498.slice. Feb 9 18:35:03.052576 kubelet[2458]: W0209 18:35:03.052462 2458 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-8e9ed585e1" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-8e9ed585e1' and this object Feb 9 18:35:03.052576 kubelet[2458]: E0209 18:35:03.052555 2458 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-8e9ed585e1" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-8e9ed585e1' and this object Feb 9 18:35:03.052576 kubelet[2458]: W0209 18:35:03.052511 2458 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-8e9ed585e1" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-8e9ed585e1' and this object Feb 9 18:35:03.052576 kubelet[2458]: E0209 18:35:03.052574 2458 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-8e9ed585e1" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-8e9ed585e1' and this object Feb 9 18:35:03.058436 kubelet[2458]: I0209 18:35:03.058398 2458 topology_manager.go:215] "Topology Admit Handler" podUID="0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4" podNamespace="calico-apiserver" podName="calico-apiserver-7f4cff6486-67nt7" Feb 9 18:35:03.063560 systemd[1]: Created slice kubepods-besteffort-pod0c67db2f_9ae2_4b4b_80c1_c3237e2ee3f4.slice. Feb 9 18:35:03.104813 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 18:35:03.104974 kernel: audit: type=1325 audit(1707503703.085:1294): table=filter:118 family=2 entries=8 op=nft_register_rule pid=4607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.085000 audit[4607]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.085000 audit[4607]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc9881b80 a2=0 a3=ffffa90696c0 items=0 ppid=2593 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.143774 kernel: audit: type=1300 audit(1707503703.085:1294): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc9881b80 a2=0 a3=ffffa90696c0 items=0 ppid=2593 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.164471 kernel: audit: type=1327 audit(1707503703.085:1294): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.101000 audit[4607]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.181841 kernel: audit: type=1325 audit(1707503703.101:1295): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.101000 audit[4607]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc9881b80 a2=0 a3=ffffa90696c0 items=0 ppid=2593 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.215118 kernel: audit: type=1300 audit(1707503703.101:1295): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc9881b80 a2=0 a3=ffffa90696c0 items=0 ppid=2593 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.231851 kernel: audit: type=1327 audit(1707503703.101:1295): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.205000 audit[4611]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.245436 kubelet[2458]: I0209 18:35:03.245387 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/156e492a-6349-4b9a-9b44-d14a99446498-calico-apiserver-certs\") pod \"calico-apiserver-7f4cff6486-t9kpx\" (UID: \"156e492a-6349-4b9a-9b44-d14a99446498\") " pod="calico-apiserver/calico-apiserver-7f4cff6486-t9kpx" Feb 9 18:35:03.245788 kubelet[2458]: I0209 18:35:03.245769 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4-calico-apiserver-certs\") pod \"calico-apiserver-7f4cff6486-67nt7\" (UID: \"0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4\") " pod="calico-apiserver/calico-apiserver-7f4cff6486-67nt7" Feb 9 18:35:03.245927 kubelet[2458]: I0209 18:35:03.245913 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wn2hb\" (UniqueName: \"kubernetes.io/projected/0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4-kube-api-access-wn2hb\") pod \"calico-apiserver-7f4cff6486-67nt7\" (UID: \"0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4\") " pod="calico-apiserver/calico-apiserver-7f4cff6486-67nt7" Feb 9 18:35:03.246029 kubelet[2458]: I0209 18:35:03.246017 2458 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57qq2\" (UniqueName: \"kubernetes.io/projected/156e492a-6349-4b9a-9b44-d14a99446498-kube-api-access-57qq2\") pod \"calico-apiserver-7f4cff6486-t9kpx\" (UID: \"156e492a-6349-4b9a-9b44-d14a99446498\") " pod="calico-apiserver/calico-apiserver-7f4cff6486-t9kpx" Feb 9 18:35:03.250965 kernel: audit: type=1325 audit(1707503703.205:1296): table=filter:120 family=2 entries=9 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.205000 audit[4611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc7f71cd0 a2=0 a3=ffff84d586c0 items=0 ppid=2593 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.284264 kernel: audit: type=1300 audit(1707503703.205:1296): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc7f71cd0 a2=0 a3=ffff84d586c0 items=0 ppid=2593 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.301081 kernel: audit: type=1327 audit(1707503703.205:1296): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:03.301259 kernel: audit: type=1325 audit(1707503703.205:1297): table=nat:121 family=2 entries=20 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.205000 audit[4611]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:03.205000 audit[4611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc7f71cd0 a2=0 a3=ffff84d586c0 items=0 ppid=2593 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:03.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:04.355340 kubelet[2458]: E0209 18:35:04.355295 2458 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.355340 kubelet[2458]: E0209 18:35:04.355343 2458 projected.go:198] Error preparing data for projected volume kube-api-access-57qq2 for pod calico-apiserver/calico-apiserver-7f4cff6486-t9kpx: failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.355756 kubelet[2458]: E0209 18:35:04.355425 2458 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/156e492a-6349-4b9a-9b44-d14a99446498-kube-api-access-57qq2 podName:156e492a-6349-4b9a-9b44-d14a99446498 nodeName:}" failed. No retries permitted until 2024-02-09 18:35:04.85540017 +0000 UTC m=+65.611718930 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-57qq2" (UniqueName: "kubernetes.io/projected/156e492a-6349-4b9a-9b44-d14a99446498-kube-api-access-57qq2") pod "calico-apiserver-7f4cff6486-t9kpx" (UID: "156e492a-6349-4b9a-9b44-d14a99446498") : failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.355756 kubelet[2458]: E0209 18:35:04.355296 2458 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.355756 kubelet[2458]: E0209 18:35:04.355695 2458 projected.go:198] Error preparing data for projected volume kube-api-access-wn2hb for pod calico-apiserver/calico-apiserver-7f4cff6486-67nt7: failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.355756 kubelet[2458]: E0209 18:35:04.355726 2458 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4-kube-api-access-wn2hb podName:0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4 nodeName:}" failed. No retries permitted until 2024-02-09 18:35:04.855716217 +0000 UTC m=+65.612034977 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-wn2hb" (UniqueName: "kubernetes.io/projected/0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4-kube-api-access-wn2hb") pod "calico-apiserver-7f4cff6486-67nt7" (UID: "0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4") : failed to sync configmap cache: timed out waiting for the condition Feb 9 18:35:04.875029 env[1356]: time="2024-02-09T18:35:04.874628828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f4cff6486-67nt7,Uid:0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:35:05.027832 systemd-networkd[1504]: cali91fc1b67fa9: Link UP Feb 9 18:35:05.043160 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:35:05.043330 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali91fc1b67fa9: link becomes ready Feb 9 18:35:05.043888 systemd-networkd[1504]: cali91fc1b67fa9: Gained carrier Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.952 [INFO][4620] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0 calico-apiserver-7f4cff6486- calico-apiserver 0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4 853 0 2024-02-09 18:35:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f4cff6486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 calico-apiserver-7f4cff6486-67nt7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali91fc1b67fa9 [] []}} ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.953 [INFO][4620] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.981 [INFO][4633] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" HandleID="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.993 [INFO][4633] ipam_plugin.go 268: Auto assigning IP ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" HandleID="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400021f040), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"calico-apiserver-7f4cff6486-67nt7", "timestamp":"2024-02-09 18:35:04.981075699 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.993 [INFO][4633] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.993 [INFO][4633] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.993 [INFO][4633] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.995 [INFO][4633] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:04.999 [INFO][4633] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.004 [INFO][4633] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.005 [INFO][4633] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.008 [INFO][4633] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.008 [INFO][4633] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.009 [INFO][4633] ipam.go 1682: Creating new handle: k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.012 [INFO][4633] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.020 [INFO][4633] ipam.go 1216: Successfully claimed IPs: [192.168.96.197/26] block=192.168.96.192/26 handle="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.021 [INFO][4633] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.197/26] handle="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.021 [INFO][4633] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:05.055357 env[1356]: 2024-02-09 18:35:05.021 [INFO][4633] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.197/26] IPv6=[] ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" HandleID="k8s-pod-network.ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.022 [INFO][4620] k8s.go 385: Populated endpoint ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0", GenerateName:"calico-apiserver-7f4cff6486-", Namespace:"calico-apiserver", SelfLink:"", UID:"0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f4cff6486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"calico-apiserver-7f4cff6486-67nt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.96.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali91fc1b67fa9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.022 [INFO][4620] k8s.go 386: Calico CNI using IPs: [192.168.96.197/32] ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.022 [INFO][4620] dataplane_linux.go 68: Setting the host side veth name to cali91fc1b67fa9 ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.044 [INFO][4620] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.045 [INFO][4620] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0", GenerateName:"calico-apiserver-7f4cff6486-", Namespace:"calico-apiserver", SelfLink:"", UID:"0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f4cff6486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f", Pod:"calico-apiserver-7f4cff6486-67nt7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.96.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali91fc1b67fa9", MAC:"ee:24:84:57:2d:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:05.055948 env[1356]: 2024-02-09 18:35:05.053 [INFO][4620] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-67nt7" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--67nt7-eth0" Feb 9 18:35:05.082641 env[1356]: time="2024-02-09T18:35:05.082553611Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:05.082641 env[1356]: time="2024-02-09T18:35:05.082595206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:05.082904 env[1356]: time="2024-02-09T18:35:05.082851339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:05.083258 env[1356]: time="2024-02-09T18:35:05.083097193Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f pid=4665 runtime=io.containerd.runc.v2 Feb 9 18:35:05.085000 audit[4673]: NETFILTER_CFG table=filter:122 family=2 entries=59 op=nft_register_chain pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:05.085000 audit[4673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd6b8c8e0 a2=0 a3=ffffaef61fa8 items=0 ppid=3530 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:05.098899 systemd[1]: Started cri-containerd-ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f.scope. Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.117000 audit: BPF prog-id=183 op=LOAD Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396132646662613335303436396661326532393163636234663137 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396132646662613335303436396661326532393163636234663137 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit: BPF prog-id=184 op=LOAD Feb 9 18:35:05.118000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396132646662613335303436396661326532393163636234663137 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit: BPF prog-id=185 op=LOAD Feb 9 18:35:05.118000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396132646662613335303436396661326532393163636234663137 Feb 9 18:35:05.118000 audit: BPF prog-id=185 op=UNLOAD Feb 9 18:35:05.118000 audit: BPF prog-id=184 op=UNLOAD Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.118000 audit: BPF prog-id=186 op=LOAD Feb 9 18:35:05.118000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396132646662613335303436396661326532393163636234663137 Feb 9 18:35:05.141892 env[1356]: time="2024-02-09T18:35:05.141769601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f4cff6486-67nt7,Uid:0c67db2f-9ae2-4b4b-80c1-c3237e2ee3f4,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f\"" Feb 9 18:35:05.146839 env[1356]: time="2024-02-09T18:35:05.145307908Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:35:05.147902 env[1356]: time="2024-02-09T18:35:05.147859959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f4cff6486-t9kpx,Uid:156e492a-6349-4b9a-9b44-d14a99446498,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:35:05.298836 systemd-networkd[1504]: calie5f622ebfc0: Link UP Feb 9 18:35:05.308010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5f622ebfc0: link becomes ready Feb 9 18:35:05.307794 systemd-networkd[1504]: calie5f622ebfc0: Gained carrier Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.217 [INFO][4698] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0 calico-apiserver-7f4cff6486- calico-apiserver 156e492a-6349-4b9a-9b44-d14a99446498 849 0 2024-02-09 18:35:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f4cff6486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-8e9ed585e1 calico-apiserver-7f4cff6486-t9kpx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie5f622ebfc0 [] []}} ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.218 [INFO][4698] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.254 [INFO][4711] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" HandleID="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.267 [INFO][4711] ipam_plugin.go 268: Auto assigning IP ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" HandleID="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b310), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-8e9ed585e1", "pod":"calico-apiserver-7f4cff6486-t9kpx", "timestamp":"2024-02-09 18:35:05.254786594 +0000 UTC"}, Hostname:"ci-3510.3.2-a-8e9ed585e1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.267 [INFO][4711] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.267 [INFO][4711] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.267 [INFO][4711] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-8e9ed585e1' Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.269 [INFO][4711] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.274 [INFO][4711] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.277 [INFO][4711] ipam.go 489: Trying affinity for 192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.279 [INFO][4711] ipam.go 155: Attempting to load block cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.282 [INFO][4711] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.96.192/26 host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.282 [INFO][4711] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.96.192/26 handle="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.283 [INFO][4711] ipam.go 1682: Creating new handle: k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.287 [INFO][4711] ipam.go 1203: Writing block in order to claim IPs block=192.168.96.192/26 handle="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.293 [INFO][4711] ipam.go 1216: Successfully claimed IPs: [192.168.96.198/26] block=192.168.96.192/26 handle="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.294 [INFO][4711] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.96.198/26] handle="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" host="ci-3510.3.2-a-8e9ed585e1" Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.294 [INFO][4711] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:35:05.318401 env[1356]: 2024-02-09 18:35:05.294 [INFO][4711] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.96.198/26] IPv6=[] ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" HandleID="k8s-pod-network.8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Workload="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.295 [INFO][4698] k8s.go 385: Populated endpoint ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0", GenerateName:"calico-apiserver-7f4cff6486-", Namespace:"calico-apiserver", SelfLink:"", UID:"156e492a-6349-4b9a-9b44-d14a99446498", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f4cff6486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"", Pod:"calico-apiserver-7f4cff6486-t9kpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.96.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5f622ebfc0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.296 [INFO][4698] k8s.go 386: Calico CNI using IPs: [192.168.96.198/32] ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.296 [INFO][4698] dataplane_linux.go 68: Setting the host side veth name to calie5f622ebfc0 ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.308 [INFO][4698] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.309 [INFO][4698] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0", GenerateName:"calico-apiserver-7f4cff6486-", Namespace:"calico-apiserver", SelfLink:"", UID:"156e492a-6349-4b9a-9b44-d14a99446498", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f4cff6486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-8e9ed585e1", ContainerID:"8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e", Pod:"calico-apiserver-7f4cff6486-t9kpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.96.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5f622ebfc0", MAC:"f6:b9:d4:44:61:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:35:05.318996 env[1356]: 2024-02-09 18:35:05.316 [INFO][4698] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e" Namespace="calico-apiserver" Pod="calico-apiserver-7f4cff6486-t9kpx" WorkloadEndpoint="ci--3510.3.2--a--8e9ed585e1-k8s-calico--apiserver--7f4cff6486--t9kpx-eth0" Feb 9 18:35:05.334504 env[1356]: time="2024-02-09T18:35:05.334423349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:35:05.334504 env[1356]: time="2024-02-09T18:35:05.334463705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:35:05.334504 env[1356]: time="2024-02-09T18:35:05.334473864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:35:05.335630 env[1356]: time="2024-02-09T18:35:05.334825867Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e pid=4737 runtime=io.containerd.runc.v2 Feb 9 18:35:05.349360 systemd[1]: Started cri-containerd-8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e.scope. Feb 9 18:35:05.358000 audit[4757]: NETFILTER_CFG table=filter:123 family=2 entries=50 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:35:05.358000 audit[4757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffd45356c0 a2=0 a3=ffff870a0fa8 items=0 ppid=3530 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.358000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.370000 audit: BPF prog-id=187 op=LOAD Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866383863636339383131303762653439323066633465633862633636 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866383863636339383131303762653439323066633465633862633636 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit: BPF prog-id=188 op=LOAD Feb 9 18:35:05.371000 audit[4747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866383863636339383131303762653439323066633465633862633636 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit: BPF prog-id=189 op=LOAD Feb 9 18:35:05.371000 audit[4747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866383863636339383131303762653439323066633465633862633636 Feb 9 18:35:05.371000 audit: BPF prog-id=189 op=UNLOAD Feb 9 18:35:05.371000 audit: BPF prog-id=188 op=UNLOAD Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { perfmon } for pid=4747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit[4747]: AVC avc: denied { bpf } for pid=4747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:05.371000 audit: BPF prog-id=190 op=LOAD Feb 9 18:35:05.371000 audit[4747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4737 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:05.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866383863636339383131303762653439323066633465633862633636 Feb 9 18:35:05.396420 env[1356]: time="2024-02-09T18:35:05.396324576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f4cff6486-t9kpx,Uid:156e492a-6349-4b9a-9b44-d14a99446498,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e\"" Feb 9 18:35:06.322802 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1819876410.mount: Deactivated successfully. Feb 9 18:35:06.636330 systemd-networkd[1504]: cali91fc1b67fa9: Gained IPv6LL Feb 9 18:35:07.020914 systemd-networkd[1504]: calie5f622ebfc0: Gained IPv6LL Feb 9 18:35:07.527354 env[1356]: time="2024-02-09T18:35:07.527305802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.533388 env[1356]: time="2024-02-09T18:35:07.533342655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.537233 env[1356]: time="2024-02-09T18:35:07.537171377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.540593 env[1356]: time="2024-02-09T18:35:07.540543987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.541394 env[1356]: time="2024-02-09T18:35:07.541361222Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:35:07.543062 env[1356]: time="2024-02-09T18:35:07.543031329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:35:07.544316 env[1356]: time="2024-02-09T18:35:07.544279039Z" level=info msg="CreateContainer within sandbox \"ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:35:07.584491 env[1356]: time="2024-02-09T18:35:07.584437149Z" level=info msg="CreateContainer within sandbox \"ce9a2dfba350469fa2e291ccb4f172c4a4fac8a346891133c384405f5d1cd14f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e\"" Feb 9 18:35:07.585221 env[1356]: time="2024-02-09T18:35:07.585172713Z" level=info msg="StartContainer for \"f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e\"" Feb 9 18:35:07.620482 systemd[1]: Started cri-containerd-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e.scope. Feb 9 18:35:07.642334 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.zEromy.mount: Deactivated successfully. Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.696000 audit: BPF prog-id=191 op=LOAD Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4665 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373534343663353535666363393435343632303137303231613266 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4665 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373534343663353535666363393435343632303137303231613266 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit: BPF prog-id=192 op=LOAD Feb 9 18:35:07.697000 audit[4782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4665 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373534343663353535666363393435343632303137303231613266 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit: BPF prog-id=193 op=LOAD Feb 9 18:35:07.697000 audit[4782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4665 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373534343663353535666363393435343632303137303231613266 Feb 9 18:35:07.697000 audit: BPF prog-id=193 op=UNLOAD Feb 9 18:35:07.697000 audit: BPF prog-id=192 op=UNLOAD Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.697000 audit: BPF prog-id=194 op=LOAD Feb 9 18:35:07.697000 audit[4782]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4665 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373534343663353535666363393435343632303137303231613266 Feb 9 18:35:07.742983 env[1356]: time="2024-02-09T18:35:07.742919174Z" level=info msg="StartContainer for \"f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e\" returns successfully" Feb 9 18:35:07.903650 env[1356]: time="2024-02-09T18:35:07.903597131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.909783 env[1356]: time="2024-02-09T18:35:07.909732294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.914293 env[1356]: time="2024-02-09T18:35:07.914246185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.919111 env[1356]: time="2024-02-09T18:35:07.919066964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:35:07.919780 env[1356]: time="2024-02-09T18:35:07.919744334Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:35:07.922550 env[1356]: time="2024-02-09T18:35:07.922498768Z" level=info msg="CreateContainer within sandbox \"8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:35:07.951688 env[1356]: time="2024-02-09T18:35:07.951643022Z" level=info msg="CreateContainer within sandbox \"8f88ccc981107be4920fc4ec8bc6679496a689104327bda8df0d72f9dab19e7e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f\"" Feb 9 18:35:07.952599 env[1356]: time="2024-02-09T18:35:07.952561687Z" level=info msg="StartContainer for \"a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f\"" Feb 9 18:35:07.981464 systemd[1]: Started cri-containerd-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f.scope. Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.996000 audit: BPF prog-id=195 op=LOAD Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4737 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306563306538333061356165333163333631366361643164306139 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4737 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306563306538333061356165333163333631366361643164306139 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit: BPF prog-id=196 op=LOAD Feb 9 18:35:07.997000 audit[4820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4737 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306563306538333061356165333163333631366361643164306139 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit: BPF prog-id=197 op=LOAD Feb 9 18:35:07.997000 audit[4820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4737 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306563306538333061356165333163333631366361643164306139 Feb 9 18:35:07.997000 audit: BPF prog-id=197 op=UNLOAD Feb 9 18:35:07.997000 audit: BPF prog-id=196 op=UNLOAD Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { perfmon } for pid=4820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit[4820]: AVC avc: denied { bpf } for pid=4820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:35:07.997000 audit: BPF prog-id=198 op=LOAD Feb 9 18:35:07.997000 audit[4820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4737 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:07.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131306563306538333061356165333163333631366361643164306139 Feb 9 18:35:08.024829 env[1356]: time="2024-02-09T18:35:08.024771568Z" level=info msg="StartContainer for \"a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f\" returns successfully" Feb 9 18:35:08.549000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.556841 kernel: kauditd_printk_skb: 236 callbacks suppressed Feb 9 18:35:08.557000 kernel: audit: type=1400 audit(1707503708.549:1372): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.549000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001200600 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.630387 kernel: audit: type=1300 audit(1707503708.549:1372): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001200600 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.659946 kernel: audit: type=1327 audit(1707503708.549:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.549000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.691958 kernel: audit: type=1400 audit(1707503708.549:1373): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.549000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001200620 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.727676 kernel: audit: type=1300 audit(1707503708.549:1373): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001200620 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.757554 kernel: audit: type=1327 audit(1707503708.549:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.758515 kubelet[2458]: I0209 18:35:08.758480 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f4cff6486-t9kpx" podStartSLOduration=3.238087024 podCreationTimestamp="2024-02-09 18:35:03 +0000 UTC" firstStartedPulling="2024-02-09 18:35:05.399667583 +0000 UTC m=+66.155986383" lastFinishedPulling="2024-02-09 18:35:07.920022665 +0000 UTC m=+68.676341465" observedRunningTime="2024-02-09 18:35:08.758272044 +0000 UTC m=+69.514590844" watchObservedRunningTime="2024-02-09 18:35:08.758442106 +0000 UTC m=+69.514760906" Feb 9 18:35:08.550000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.786096 kernel: audit: type=1400 audit(1707503708.550:1374): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.550000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e14160 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.822756 kernel: audit: type=1300 audit(1707503708.550:1374): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e14160 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.854707 kernel: audit: type=1327 audit(1707503708.550:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.550000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.883003 kernel: audit: type=1400 audit(1707503708.550:1375): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:08.550000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e14280 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:08.706000 audit[4792]: AVC avc: denied { watch } for pid=4792 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.3398187974/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c597,c679 tclass=file permissive=0 Feb 9 18:35:08.706000 audit[4792]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f3ade0 a2=fc6 a3=0 items=0 ppid=4665 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 key=(null) Feb 9 18:35:08.706000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:35:08.954000 audit[4849]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:08.954000 audit[4849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffce9181e0 a2=0 a3=ffff9502b6c0 items=0 ppid=2593 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:08.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:08.955000 audit[4849]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:08.955000 audit[4849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffce9181e0 a2=0 a3=ffff9502b6c0 items=0 ppid=2593 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:08.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:08.964000 audit[4851]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:08.964000 audit[4851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff3e25710 a2=0 a3=ffffa3fd66c0 items=0 ppid=2593 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:08.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:08.965000 audit[4851]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:08.965000 audit[4851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff3e25710 a2=0 a3=ffffa3fd66c0 items=0 ppid=2593 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:08.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:09.939000 audit[4830]: AVC avc: denied { watch } for pid=4830 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.225426837/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c153,c291 tclass=file permissive=0 Feb 9 18:35:09.939000 audit[4830]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b39fa0 a2=fc6 a3=0 items=0 ppid=4737 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 key=(null) Feb 9 18:35:09.939000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:35:30.131375 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.6PCalb.mount: Deactivated successfully. Feb 9 18:35:32.173731 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.35cTmn.mount: Deactivated successfully. Feb 9 18:35:34.895671 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.WFUa1R.mount: Deactivated successfully. Feb 9 18:35:34.929058 kubelet[2458]: I0209 18:35:34.929028 2458 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f4cff6486-67nt7" podStartSLOduration=29.531988155 podCreationTimestamp="2024-02-09 18:35:03 +0000 UTC" firstStartedPulling="2024-02-09 18:35:05.144838837 +0000 UTC m=+65.901157637" lastFinishedPulling="2024-02-09 18:35:07.541829813 +0000 UTC m=+68.298148613" observedRunningTime="2024-02-09 18:35:08.859000307 +0000 UTC m=+69.615319107" watchObservedRunningTime="2024-02-09 18:35:34.928979131 +0000 UTC m=+95.685297891" Feb 9 18:35:34.948000 audit[4936]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:34.955048 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 18:35:34.955181 kernel: audit: type=1325 audit(1707503734.948:1382): table=filter:128 family=2 entries=9 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:34.948000 audit[4936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd11aeda0 a2=0 a3=ffff8c8486c0 items=0 ppid=2593 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:35.009215 kernel: audit: type=1300 audit(1707503734.948:1382): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd11aeda0 a2=0 a3=ffff8c8486c0 items=0 ppid=2593 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:34.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.025067 kernel: audit: type=1327 audit(1707503734.948:1382): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:34.954000 audit[4936]: NETFILTER_CFG table=nat:129 family=2 entries=27 op=nft_register_chain pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:35.041094 kernel: audit: type=1325 audit(1707503734.954:1383): table=nat:129 family=2 entries=27 op=nft_register_chain pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:34.954000 audit[4936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffd11aeda0 a2=0 a3=ffff8c8486c0 items=0 ppid=2593 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:35.071464 kernel: audit: type=1300 audit(1707503734.954:1383): arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffd11aeda0 a2=0 a3=ffff8c8486c0 items=0 ppid=2593 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:34.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.086692 kernel: audit: type=1327 audit(1707503734.954:1383): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.216000 audit[4957]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:35.216000 audit[4957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdababd80 a2=0 a3=ffff986d26c0 items=0 ppid=2593 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:35.266988 kernel: audit: type=1325 audit(1707503735.216:1384): table=filter:130 family=2 entries=8 op=nft_register_rule pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:35.267126 kernel: audit: type=1300 audit(1707503735.216:1384): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdababd80 a2=0 a3=ffff986d26c0 items=0 ppid=2593 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:35.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.284253 kernel: audit: type=1327 audit(1707503735.216:1384): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.233000 audit[4957]: NETFILTER_CFG table=nat:131 family=2 entries=34 op=nft_register_chain pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:35.301150 kernel: audit: type=1325 audit(1707503735.233:1385): table=nat:131 family=2 entries=34 op=nft_register_chain pid=4957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:35:35.233000 audit[4957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=ffffdababd80 a2=0 a3=ffff986d26c0 items=0 ppid=2593 pid=4957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:35.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:35:35.888288 systemd[1]: run-containerd-runc-k8s.io-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f-runc.XyafUa.mount: Deactivated successfully. Feb 9 18:35:55.802000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.810106 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 18:35:55.810271 kernel: audit: type=1400 audit(1707503755.802:1386): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.802000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e908f90 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.868623 kernel: audit: type=1300 audit(1707503755.802:1386): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e908f90 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.896639 kernel: audit: type=1327 audit(1707503755.802:1386): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.813000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.924614 kernel: audit: type=1400 audit(1707503755.813:1387): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.813000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400e909020 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.961334 kernel: audit: type=1300 audit(1707503755.813:1387): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400e909020 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.990971 kernel: audit: type=1327 audit(1707503755.813:1387): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.991121 kernel: audit: type=1400 audit(1707503755.820:1388): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.820000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.820000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4013617880 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:56.046883 kernel: audit: type=1300 audit(1707503755.820:1388): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4013617880 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.820000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:56.074166 kernel: audit: type=1327 audit(1707503755.820:1388): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.833000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:56.100274 kernel: audit: type=1400 audit(1707503755.833:1389): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.833000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400e9093e0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.834000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.834000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400e8fee60 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.856000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.856000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e8873b0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:35:55.856000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:35:55.960000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.960000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002842da0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:55.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:35:55.960000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:35:55.960000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ac7c20 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:35:55.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:00.129774 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.upu3nC.mount: Deactivated successfully. Feb 9 18:36:02.172974 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.o3vHi7.mount: Deactivated successfully. Feb 9 18:36:05.162444 systemd[1]: run-containerd-runc-k8s.io-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f-runc.v9g0ev.mount: Deactivated successfully. Feb 9 18:36:08.551000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.557830 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 18:36:08.557965 kernel: audit: type=1400 audit(1707503768.551:1394): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.551000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.613939 kernel: audit: type=1400 audit(1707503768.551:1395): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.551000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002aad220 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.677593 kernel: audit: type=1300 audit(1707503768.551:1395): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002aad220 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.677733 kernel: audit: type=1327 audit(1707503768.551:1395): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.677766 kernel: audit: type=1400 audit(1707503768.551:1396): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.551000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.551000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002aad340 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.739017 kernel: audit: type=1300 audit(1707503768.551:1396): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002aad340 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.766924 kernel: audit: type=1327 audit(1707503768.551:1396): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.767070 kernel: audit: type=1300 audit(1707503768.551:1394): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002036220 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.551000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002036220 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.833279 kernel: audit: type=1327 audit(1707503768.551:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.553000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.859412 kernel: audit: type=1400 audit(1707503768.553:1397): avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:08.553000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002036260 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:08.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:08.737000 audit[4792]: AVC avc: denied { watch } for pid=4792 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.3398187974/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c597,c679 tclass=file permissive=0 Feb 9 18:36:08.737000 audit[4792]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40009ef200 a2=fc6 a3=0 items=0 ppid=4665 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 key=(null) Feb 9 18:36:08.737000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:09.941000 audit[4830]: AVC avc: denied { watch } for pid=4830 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.225426837/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c153,c291 tclass=file permissive=0 Feb 9 18:36:09.941000 audit[4830]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ae38e0 a2=fc6 a3=0 items=0 ppid=4737 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 key=(null) Feb 9 18:36:09.941000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:36:29.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:29.561626 systemd[1]: Started sshd@7-10.200.20.36:22-10.200.12.6:59820.service. Feb 9 18:36:29.567059 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 9 18:36:29.567193 kernel: audit: type=1130 audit(1707503789.561:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:30.015000 audit[5097]: USER_ACCT pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.016384 sshd[5097]: Accepted publickey for core from 10.200.12.6 port 59820 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:30.018313 sshd[5097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:30.017000 audit[5097]: CRED_ACQ pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.069793 kernel: audit: type=1101 audit(1707503790.015:1401): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.069927 kernel: audit: type=1103 audit(1707503790.017:1402): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.087300 kernel: audit: type=1006 audit(1707503790.017:1403): pid=5097 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 18:36:30.092767 systemd-logind[1340]: New session 10 of user core. Feb 9 18:36:30.123474 kernel: audit: type=1300 audit(1707503790.017:1403): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7da1180 a2=3 a3=1 items=0 ppid=1 pid=5097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:30.017000 audit[5097]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7da1180 a2=3 a3=1 items=0 ppid=1 pid=5097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:30.093920 systemd[1]: Started session-10.scope. Feb 9 18:36:30.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:30.135215 kernel: audit: type=1327 audit(1707503790.017:1403): proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:30.100000 audit[5097]: USER_START pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.165328 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.SYdrj1.mount: Deactivated successfully. Feb 9 18:36:30.123000 audit[5099]: CRED_ACQ pid=5099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.166267 kernel: audit: type=1105 audit(1707503790.100:1404): pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.197240 kernel: audit: type=1103 audit(1707503790.123:1405): pid=5099 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.511373 sshd[5097]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:30.512000 audit[5097]: USER_END pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.515255 systemd-logind[1340]: Session 10 logged out. Waiting for processes to exit. Feb 9 18:36:30.516521 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 18:36:30.517795 systemd-logind[1340]: Removed session 10. Feb 9 18:36:30.518427 systemd[1]: sshd@7-10.200.20.36:22-10.200.12.6:59820.service: Deactivated successfully. Feb 9 18:36:30.513000 audit[5097]: CRED_DISP pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.569416 kernel: audit: type=1106 audit(1707503790.512:1406): pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.569542 kernel: audit: type=1104 audit(1707503790.513:1407): pid=5097 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:30.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:34.899062 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.kfFkSX.mount: Deactivated successfully. Feb 9 18:36:35.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:35.581396 systemd[1]: Started sshd@8-10.200.20.36:22-10.200.12.6:59824.service. Feb 9 18:36:35.587103 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:36:35.587281 kernel: audit: type=1130 audit(1707503795.580:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:35.893507 systemd[1]: run-containerd-runc-k8s.io-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f-runc.kSbFVH.mount: Deactivated successfully. Feb 9 18:36:36.034000 audit[5210]: USER_ACCT pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.035886 sshd[5210]: Accepted publickey for core from 10.200.12.6 port 59824 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:36.037733 sshd[5210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:36.036000 audit[5210]: CRED_ACQ pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.086368 kernel: audit: type=1101 audit(1707503796.034:1410): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.086470 kernel: audit: type=1103 audit(1707503796.036:1411): pid=5210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.101447 kernel: audit: type=1006 audit(1707503796.036:1412): pid=5210 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 18:36:36.036000 audit[5210]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4bb2410 a2=3 a3=1 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.105599 systemd-logind[1340]: New session 11 of user core. Feb 9 18:36:36.106229 systemd[1]: Started session-11.scope. Feb 9 18:36:36.128005 kernel: audit: type=1300 audit(1707503796.036:1412): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4bb2410 a2=3 a3=1 items=0 ppid=1 pid=5210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.036000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:36.137438 kernel: audit: type=1327 audit(1707503796.036:1412): proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:36.110000 audit[5210]: USER_START pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.165802 kernel: audit: type=1105 audit(1707503796.110:1413): pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.112000 audit[5212]: CRED_ACQ pid=5212 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.190374 kernel: audit: type=1103 audit(1707503796.112:1414): pid=5212 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.423700 sshd[5210]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:36.423000 audit[5210]: USER_END pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.456649 kernel: audit: type=1106 audit(1707503796.423:1415): pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.456778 kernel: audit: type=1104 audit(1707503796.423:1416): pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.423000 audit[5210]: CRED_DISP pid=5210 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:36.455343 systemd[1]: sshd@8-10.200.20.36:22-10.200.12.6:59824.service: Deactivated successfully. Feb 9 18:36:36.456163 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 18:36:36.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:36.479396 systemd-logind[1340]: Session 11 logged out. Waiting for processes to exit. Feb 9 18:36:36.480246 systemd-logind[1340]: Removed session 11. Feb 9 18:36:41.503353 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:36:41.503482 kernel: audit: type=1130 audit(1707503801.487:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:54834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:41.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:54834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:41.488590 systemd[1]: Started sshd@9-10.200.20.36:22-10.200.12.6:54834.service. Feb 9 18:36:41.880000 audit[5223]: USER_ACCT pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.881573 sshd[5223]: Accepted publickey for core from 10.200.12.6 port 54834 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:41.883582 sshd[5223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:41.889000 systemd[1]: Started session-12.scope. Feb 9 18:36:41.890278 systemd-logind[1340]: New session 12 of user core. Feb 9 18:36:41.881000 audit[5223]: CRED_ACQ pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.933855 kernel: audit: type=1101 audit(1707503801.880:1419): pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.933951 kernel: audit: type=1103 audit(1707503801.881:1420): pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.949014 kernel: audit: type=1006 audit(1707503801.881:1421): pid=5223 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 18:36:41.949273 kernel: audit: type=1300 audit(1707503801.881:1421): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff47c6110 a2=3 a3=1 items=0 ppid=1 pid=5223 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:41.881000 audit[5223]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff47c6110 a2=3 a3=1 items=0 ppid=1 pid=5223 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:41.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:41.984377 kernel: audit: type=1327 audit(1707503801.881:1421): proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:41.984540 kernel: audit: type=1105 audit(1707503801.894:1422): pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.894000 audit[5223]: USER_START pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:41.896000 audit[5225]: CRED_ACQ pid=5225 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.034582 kernel: audit: type=1103 audit(1707503801.896:1423): pid=5225 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.245443 sshd[5223]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:42.245000 audit[5223]: USER_END pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.250233 systemd-logind[1340]: Session 12 logged out. Waiting for processes to exit. Feb 9 18:36:42.251668 systemd[1]: sshd@9-10.200.20.36:22-10.200.12.6:54834.service: Deactivated successfully. Feb 9 18:36:42.252601 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 18:36:42.254293 systemd-logind[1340]: Removed session 12. Feb 9 18:36:42.247000 audit[5223]: CRED_DISP pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.299609 kernel: audit: type=1106 audit(1707503802.245:1424): pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.299715 kernel: audit: type=1104 audit(1707503802.247:1425): pid=5223 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:42.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:54834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:47.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:40202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:47.316489 systemd[1]: Started sshd@10-10.200.20.36:22-10.200.12.6:40202.service. Feb 9 18:36:47.322235 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:36:47.322303 kernel: audit: type=1130 audit(1707503807.315:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:40202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:47.736000 audit[5238]: USER_ACCT pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.737946 sshd[5238]: Accepted publickey for core from 10.200.12.6 port 40202 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:47.764174 sshd[5238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:47.764428 kernel: audit: type=1101 audit(1707503807.736:1428): pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.764465 kernel: audit: type=1103 audit(1707503807.762:1429): pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.762000 audit[5238]: CRED_ACQ pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.807106 kernel: audit: type=1006 audit(1707503807.762:1430): pid=5238 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 18:36:47.762000 audit[5238]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3b37860 a2=3 a3=1 items=0 ppid=1 pid=5238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:47.834761 kernel: audit: type=1300 audit(1707503807.762:1430): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3b37860 a2=3 a3=1 items=0 ppid=1 pid=5238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:47.838253 systemd-logind[1340]: New session 13 of user core. Feb 9 18:36:47.838844 systemd[1]: Started session-13.scope. Feb 9 18:36:47.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:47.848798 kernel: audit: type=1327 audit(1707503807.762:1430): proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:47.848922 kernel: audit: type=1105 audit(1707503807.843:1431): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.843000 audit[5238]: USER_START pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.846000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:47.900168 kernel: audit: type=1103 audit(1707503807.846:1432): pid=5240 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.152642 sshd[5238]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:48.152000 audit[5238]: USER_END pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.157579 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 18:36:48.158390 systemd[1]: sshd@10-10.200.20.36:22-10.200.12.6:40202.service: Deactivated successfully. Feb 9 18:36:48.154000 audit[5238]: CRED_DISP pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.182899 systemd-logind[1340]: Session 13 logged out. Waiting for processes to exit. Feb 9 18:36:48.208380 kernel: audit: type=1106 audit(1707503808.152:1433): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.208499 kernel: audit: type=1104 audit(1707503808.154:1434): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:40202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:48.209720 systemd-logind[1340]: Removed session 13. Feb 9 18:36:48.220091 systemd[1]: Started sshd@11-10.200.20.36:22-10.200.12.6:40208.service. Feb 9 18:36:48.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.36:22-10.200.12.6:40208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:48.606072 sshd[5250]: Accepted publickey for core from 10.200.12.6 port 40208 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:48.604000 audit[5250]: USER_ACCT pid=5250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.607459 sshd[5250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:48.605000 audit[5250]: CRED_ACQ pid=5250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.605000 audit[5250]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1f8d640 a2=3 a3=1 items=0 ppid=1 pid=5250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:48.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:48.612240 systemd[1]: Started session-14.scope. Feb 9 18:36:48.612922 systemd-logind[1340]: New session 14 of user core. Feb 9 18:36:48.615000 audit[5250]: USER_START pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:48.617000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:49.680968 sshd[5250]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:49.682000 audit[5250]: USER_END pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:49.682000 audit[5250]: CRED_DISP pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:49.684406 systemd[1]: sshd@11-10.200.20.36:22-10.200.12.6:40208.service: Deactivated successfully. Feb 9 18:36:49.685228 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 18:36:49.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.36:22-10.200.12.6:40208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:49.686348 systemd-logind[1340]: Session 14 logged out. Waiting for processes to exit. Feb 9 18:36:49.687381 systemd-logind[1340]: Removed session 14. Feb 9 18:36:49.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.36:22-10.200.12.6:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:49.753065 systemd[1]: Started sshd@12-10.200.20.36:22-10.200.12.6:40216.service. Feb 9 18:36:50.180000 audit[5261]: USER_ACCT pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.180844 sshd[5261]: Accepted publickey for core from 10.200.12.6 port 40216 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:50.181000 audit[5261]: CRED_ACQ pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.182000 audit[5261]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd31ef20 a2=3 a3=1 items=0 ppid=1 pid=5261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:50.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:50.182591 sshd[5261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:50.187776 systemd[1]: Started session-15.scope. Feb 9 18:36:50.188303 systemd-logind[1340]: New session 15 of user core. Feb 9 18:36:50.193000 audit[5261]: USER_START pid=5261 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.195000 audit[5263]: CRED_ACQ pid=5263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.556829 sshd[5261]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:50.557000 audit[5261]: USER_END pid=5261 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.558000 audit[5261]: CRED_DISP pid=5261 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:50.559928 systemd-logind[1340]: Session 15 logged out. Waiting for processes to exit. Feb 9 18:36:50.561109 systemd[1]: sshd@12-10.200.20.36:22-10.200.12.6:40216.service: Deactivated successfully. Feb 9 18:36:50.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.36:22-10.200.12.6:40216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:50.561932 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 18:36:50.562492 systemd-logind[1340]: Removed session 15. Feb 9 18:36:55.621495 systemd[1]: Started sshd@13-10.200.20.36:22-10.200.12.6:40224.service. Feb 9 18:36:55.631470 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 18:36:55.631601 kernel: audit: type=1130 audit(1707503815.620:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:40224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:55.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:40224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:55.804000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.804000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40152f5b90 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.864551 kernel: audit: type=1400 audit(1707503815.804:1455): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.864659 kernel: audit: type=1300 audit(1707503815.804:1455): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40152f5b90 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.892600 kernel: audit: type=1327 audit(1707503815.804:1455): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.831000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.920013 kernel: audit: type=1400 audit(1707503815.831:1456): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.831000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4015333720 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.951132 kernel: audit: type=1300 audit(1707503815.831:1456): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4015333720 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.978231 kernel: audit: type=1327 audit(1707503815.831:1456): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.978473 kernel: audit: type=1400 audit(1707503815.831:1457): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.831000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.831000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40152f5ce0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:56.036053 kernel: audit: type=1300 audit(1707503815.831:1457): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40152f5ce0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:56.062482 kernel: audit: type=1327 audit(1707503815.831:1457): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.837000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.837000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=401538a540 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.837000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.863000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.863000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.863000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4015333e80 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.863000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40152f5dd0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:36:55.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:36:55.960000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.960000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001e169c0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:55.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:55.961000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:36:55.961000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400124b9c0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:36:55.961000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:36:56.131829 sshd[5276]: Accepted publickey for core from 10.200.12.6 port 40224 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:56.133306 sshd[5276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:56.130000 audit[5276]: USER_ACCT pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.131000 audit[5276]: CRED_ACQ pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.131000 audit[5276]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff834ded0 a2=3 a3=1 items=0 ppid=1 pid=5276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:56.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:56.137874 systemd[1]: Started session-16.scope. Feb 9 18:36:56.138099 systemd-logind[1340]: New session 16 of user core. Feb 9 18:36:56.141000 audit[5276]: USER_START pid=5276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.142000 audit[5278]: CRED_ACQ pid=5278 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.475679 sshd[5276]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:56.475000 audit[5276]: USER_END pid=5276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.475000 audit[5276]: CRED_DISP pid=5276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:56.478980 systemd[1]: sshd@13-10.200.20.36:22-10.200.12.6:40224.service: Deactivated successfully. Feb 9 18:36:56.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:40224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:56.479817 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 18:36:56.480292 systemd-logind[1340]: Session 16 logged out. Waiting for processes to exit. Feb 9 18:36:56.481114 systemd-logind[1340]: Removed session 16. Feb 9 18:37:01.541472 systemd[1]: Started sshd@14-10.200.20.36:22-10.200.12.6:55944.service. Feb 9 18:37:01.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:55944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:01.547583 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 18:37:01.547690 kernel: audit: type=1130 audit(1707503821.541:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:55944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:01.928000 audit[5315]: USER_ACCT pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.928598 sshd[5315]: Accepted publickey for core from 10.200.12.6 port 55944 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:01.930408 sshd[5315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:01.929000 audit[5315]: CRED_ACQ pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.978520 kernel: audit: type=1101 audit(1707503821.928:1472): pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.978657 kernel: audit: type=1103 audit(1707503821.929:1473): pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:01.993908 kernel: audit: type=1006 audit(1707503821.929:1474): pid=5315 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 18:37:01.929000 audit[5315]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc88c3f80 a2=3 a3=1 items=0 ppid=1 pid=5315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:02.020973 kernel: audit: type=1300 audit(1707503821.929:1474): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc88c3f80 a2=3 a3=1 items=0 ppid=1 pid=5315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:02.023887 systemd[1]: Started session-17.scope. Feb 9 18:37:02.030069 kernel: audit: type=1327 audit(1707503821.929:1474): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:02.030092 systemd-logind[1340]: New session 17 of user core. Feb 9 18:37:02.034000 audit[5315]: USER_START pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.064000 audit[5317]: CRED_ACQ pid=5317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.088298 kernel: audit: type=1105 audit(1707503822.034:1475): pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.088429 kernel: audit: type=1103 audit(1707503822.064:1476): pid=5317 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.190623 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.gidn27.mount: Deactivated successfully. Feb 9 18:37:02.365130 sshd[5315]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:02.364000 audit[5315]: USER_END pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.365000 audit[5315]: CRED_DISP pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.394717 systemd[1]: sshd@14-10.200.20.36:22-10.200.12.6:55944.service: Deactivated successfully. Feb 9 18:37:02.395542 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 18:37:02.417718 kernel: audit: type=1106 audit(1707503822.364:1477): pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.417865 kernel: audit: type=1104 audit(1707503822.365:1478): pid=5315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:02.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:55944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:02.418621 systemd-logind[1340]: Session 17 logged out. Waiting for processes to exit. Feb 9 18:37:02.419458 systemd-logind[1340]: Removed session 17. Feb 9 18:37:04.894468 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.yig1fU.mount: Deactivated successfully. Feb 9 18:37:05.889080 systemd[1]: run-containerd-runc-k8s.io-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f-runc.paAdPY.mount: Deactivated successfully. Feb 9 18:37:07.435958 systemd[1]: Started sshd@15-10.200.20.36:22-10.200.12.6:37932.service. Feb 9 18:37:07.467665 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:07.467803 kernel: audit: type=1130 audit(1707503827.434:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:37932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:07.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:37932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:07.854000 audit[5382]: USER_ACCT pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.855509 sshd[5382]: Accepted publickey for core from 10.200.12.6 port 37932 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:07.882872 sshd[5382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:07.881000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.908183 kernel: audit: type=1101 audit(1707503827.854:1481): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.908322 kernel: audit: type=1103 audit(1707503827.881:1482): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.923897 kernel: audit: type=1006 audit(1707503827.881:1483): pid=5382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 18:37:07.881000 audit[5382]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc173a2a0 a2=3 a3=1 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.950985 kernel: audit: type=1300 audit(1707503827.881:1483): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc173a2a0 a2=3 a3=1 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:07.961000 kernel: audit: type=1327 audit(1707503827.881:1483): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:07.963612 systemd-logind[1340]: New session 18 of user core. Feb 9 18:37:07.964131 systemd[1]: Started session-18.scope. Feb 9 18:37:07.967000 audit[5382]: USER_START pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:07.997000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.022586 kernel: audit: type=1105 audit(1707503827.967:1484): pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.022716 kernel: audit: type=1103 audit(1707503827.997:1485): pid=5384 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.307727 sshd[5382]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:08.307000 audit[5382]: USER_END pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.311651 systemd[1]: sshd@15-10.200.20.36:22-10.200.12.6:37932.service: Deactivated successfully. Feb 9 18:37:08.312491 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 18:37:08.307000 audit[5382]: CRED_DISP pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.361436 kernel: audit: type=1106 audit(1707503828.307:1486): pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.361566 kernel: audit: type=1104 audit(1707503828.307:1487): pid=5382 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:08.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:37932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:08.362017 systemd-logind[1340]: Session 18 logged out. Waiting for processes to exit. Feb 9 18:37:08.362912 systemd-logind[1340]: Removed session 18. Feb 9 18:37:08.552000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:08.552000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026b9600 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:08.552000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:08.552000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:08.552000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027b0aa0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:08.552000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:08.552000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:08.552000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026b9620 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:08.552000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:08.553000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:08.553000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027b0cc0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:08.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:08.740000 audit[4792]: AVC avc: denied { watch } for pid=4792 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.3398187974/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c597,c679 tclass=file permissive=0 Feb 9 18:37:08.740000 audit[4792]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400182c860 a2=fc6 a3=0 items=0 ppid=4665 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 key=(null) Feb 9 18:37:08.740000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:37:09.942000 audit[4830]: AVC avc: denied { watch } for pid=4830 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.225426837/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c153,c291 tclass=file permissive=0 Feb 9 18:37:09.942000 audit[4830]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001ed5d80 a2=fc6 a3=0 items=0 ppid=4737 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 key=(null) Feb 9 18:37:09.942000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:37:13.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:13.378263 systemd[1]: Started sshd@16-10.200.20.36:22-10.200.12.6:37936.service. Feb 9 18:37:13.383747 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 18:37:13.383895 kernel: audit: type=1130 audit(1707503833.377:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:13.796000 audit[5398]: USER_ACCT pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.799127 sshd[5398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:13.799755 sshd[5398]: Accepted publickey for core from 10.200.12.6 port 37936 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:13.797000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.848402 kernel: audit: type=1101 audit(1707503833.796:1496): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.848573 kernel: audit: type=1103 audit(1707503833.797:1497): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.864047 kernel: audit: type=1006 audit(1707503833.797:1498): pid=5398 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 18:37:13.797000 audit[5398]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1a264a0 a2=3 a3=1 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:13.890345 kernel: audit: type=1300 audit(1707503833.797:1498): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1a264a0 a2=3 a3=1 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:13.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:13.900049 kernel: audit: type=1327 audit(1707503833.797:1498): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:13.902193 systemd-logind[1340]: New session 19 of user core. Feb 9 18:37:13.902710 systemd[1]: Started session-19.scope. Feb 9 18:37:13.906000 audit[5398]: USER_START pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.935000 audit[5400]: CRED_ACQ pid=5400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.959888 kernel: audit: type=1105 audit(1707503833.906:1499): pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:13.960011 kernel: audit: type=1103 audit(1707503833.935:1500): pid=5400 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.246509 sshd[5398]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:14.246000 audit[5398]: USER_END pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.250318 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 18:37:14.251193 systemd[1]: sshd@16-10.200.20.36:22-10.200.12.6:37936.service: Deactivated successfully. Feb 9 18:37:14.247000 audit[5398]: CRED_DISP pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.303097 kernel: audit: type=1106 audit(1707503834.246:1501): pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.303232 kernel: audit: type=1104 audit(1707503834.247:1502): pid=5398 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:14.303959 systemd-logind[1340]: Session 19 logged out. Waiting for processes to exit. Feb 9 18:37:14.305690 systemd-logind[1340]: Removed session 19. Feb 9 18:37:14.318627 systemd[1]: Started sshd@17-10.200.20.36:22-10.200.12.6:37950.service. Feb 9 18:37:14.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.36:22-10.200.12.6:37950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:14.743000 audit[5409]: USER_ACCT pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.744634 sshd[5409]: Accepted publickey for core from 10.200.12.6 port 37950 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:14.744000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.744000 audit[5409]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff84f9d00 a2=3 a3=1 items=0 ppid=1 pid=5409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:14.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:14.746337 sshd[5409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:14.750914 systemd[1]: Started session-20.scope. Feb 9 18:37:14.752145 systemd-logind[1340]: New session 20 of user core. Feb 9 18:37:14.754000 audit[5409]: USER_START pid=5409 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:14.756000 audit[5411]: CRED_ACQ pid=5411 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.220094 sshd[5409]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:15.220000 audit[5409]: USER_END pid=5409 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.220000 audit[5409]: CRED_DISP pid=5409 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.222962 systemd-logind[1340]: Session 20 logged out. Waiting for processes to exit. Feb 9 18:37:15.223125 systemd[1]: sshd@17-10.200.20.36:22-10.200.12.6:37950.service: Deactivated successfully. Feb 9 18:37:15.223917 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 18:37:15.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.36:22-10.200.12.6:37950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:15.224728 systemd-logind[1340]: Removed session 20. Feb 9 18:37:15.284853 systemd[1]: Started sshd@18-10.200.20.36:22-10.200.12.6:37956.service. Feb 9 18:37:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.36:22-10.200.12.6:37956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:15.671000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.672669 sshd[5419]: Accepted publickey for core from 10.200.12.6 port 37956 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:15.672000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.672000 audit[5419]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd51c4cf0 a2=3 a3=1 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:15.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:15.674441 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:15.678665 systemd-logind[1340]: New session 21 of user core. Feb 9 18:37:15.679293 systemd[1]: Started session-21.scope. Feb 9 18:37:15.682000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:15.684000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:16.648000 audit[5432]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.648000 audit[5432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffdd96ee80 a2=0 a3=ffff83b306c0 items=0 ppid=2593 pid=5432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.650000 audit[5432]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.650000 audit[5432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffdd96ee80 a2=0 a3=ffff83b306c0 items=0 ppid=2593 pid=5432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.680000 audit[5434]: NETFILTER_CFG table=filter:134 family=2 entries=32 op=nft_register_rule pid=5434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.680000 audit[5434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffca03f450 a2=0 a3=ffffa6f6f6c0 items=0 ppid=2593 pid=5434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.681000 audit[5434]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=5434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.681000 audit[5434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffca03f450 a2=0 a3=ffffa6f6f6c0 items=0 ppid=2593 pid=5434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.724951 sshd[5419]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:16.725000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:16.725000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:16.728721 systemd[1]: sshd@18-10.200.20.36:22-10.200.12.6:37956.service: Deactivated successfully. Feb 9 18:37:16.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.36:22-10.200.12.6:37956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:16.729578 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 18:37:16.730230 systemd-logind[1340]: Session 21 logged out. Waiting for processes to exit. Feb 9 18:37:16.731382 systemd-logind[1340]: Removed session 21. Feb 9 18:37:16.790488 systemd[1]: Started sshd@19-10.200.20.36:22-10.200.12.6:37960.service. Feb 9 18:37:16.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.36:22-10.200.12.6:37960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:17.181601 sshd[5437]: Accepted publickey for core from 10.200.12.6 port 37960 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:17.180000 audit[5437]: USER_ACCT pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.181000 audit[5437]: CRED_ACQ pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.181000 audit[5437]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7426070 a2=3 a3=1 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:17.183595 sshd[5437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:17.188015 systemd[1]: Started session-22.scope. Feb 9 18:37:17.188675 systemd-logind[1340]: New session 22 of user core. Feb 9 18:37:17.191000 audit[5437]: USER_START pid=5437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.193000 audit[5439]: CRED_ACQ pid=5439 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.846050 sshd[5437]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:17.846000 audit[5437]: USER_END pid=5437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.846000 audit[5437]: CRED_DISP pid=5437 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:17.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.36:22-10.200.12.6:37960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:17.849651 systemd[1]: sshd@19-10.200.20.36:22-10.200.12.6:37960.service: Deactivated successfully. Feb 9 18:37:17.850481 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 18:37:17.850841 systemd-logind[1340]: Session 22 logged out. Waiting for processes to exit. Feb 9 18:37:17.851960 systemd-logind[1340]: Removed session 22. Feb 9 18:37:17.916302 systemd[1]: Started sshd@20-10.200.20.36:22-10.200.12.6:59668.service. Feb 9 18:37:17.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:18.337691 sshd[5448]: Accepted publickey for core from 10.200.12.6 port 59668 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:18.336000 audit[5448]: USER_ACCT pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.337000 audit[5448]: CRED_ACQ pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.337000 audit[5448]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffded8ff70 a2=3 a3=1 items=0 ppid=1 pid=5448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:18.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:18.339077 sshd[5448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:18.343975 systemd[1]: Started session-23.scope. Feb 9 18:37:18.344321 systemd-logind[1340]: New session 23 of user core. Feb 9 18:37:18.348000 audit[5448]: USER_START pid=5448 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.349000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.707334 sshd[5448]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:18.707000 audit[5448]: USER_END pid=5448 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.711008 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 18:37:18.712029 systemd[1]: sshd@20-10.200.20.36:22-10.200.12.6:59668.service: Deactivated successfully. Feb 9 18:37:18.714038 kernel: kauditd_printk_skb: 54 callbacks suppressed Feb 9 18:37:18.714136 kernel: audit: type=1106 audit(1707503838.707:1541): pid=5448 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.719740 systemd-logind[1340]: Session 23 logged out. Waiting for processes to exit. Feb 9 18:37:18.720675 systemd-logind[1340]: Removed session 23. Feb 9 18:37:18.707000 audit[5448]: CRED_DISP pid=5448 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.765282 kernel: audit: type=1104 audit(1707503838.707:1542): pid=5448 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:18.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:18.789319 kernel: audit: type=1131 audit(1707503838.707:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:59668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:22.916000 audit[5462]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:22.916000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe9d28cd0 a2=0 a3=ffffb9b8e6c0 items=0 ppid=2593 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.964107 kernel: audit: type=1325 audit(1707503842.916:1544): table=filter:136 family=2 entries=20 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:22.964247 kernel: audit: type=1300 audit(1707503842.916:1544): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe9d28cd0 a2=0 a3=ffffb9b8e6c0 items=0 ppid=2593 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:22.979628 kernel: audit: type=1327 audit(1707503842.916:1544): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:22.920000 audit[5462]: NETFILTER_CFG table=nat:137 family=2 entries=106 op=nft_register_chain pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:22.920000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffe9d28cd0 a2=0 a3=ffffb9b8e6c0 items=0 ppid=2593 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:23.031073 kernel: audit: type=1325 audit(1707503842.920:1545): table=nat:137 family=2 entries=106 op=nft_register_chain pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:23.031261 kernel: audit: type=1300 audit(1707503842.920:1545): arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffe9d28cd0 a2=0 a3=ffffb9b8e6c0 items=0 ppid=2593 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:23.046868 kernel: audit: type=1327 audit(1707503842.920:1545): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:23.778086 systemd[1]: Started sshd@21-10.200.20.36:22-10.200.12.6:59684.service. Feb 9 18:37:23.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:59684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:23.805301 kernel: audit: type=1130 audit(1707503843.778:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:59684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:24.197000 audit[5471]: USER_ACCT pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.199706 sshd[5471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:24.200440 sshd[5471]: Accepted publickey for core from 10.200.12.6 port 59684 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:24.199000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.247908 kernel: audit: type=1101 audit(1707503844.197:1547): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.248036 kernel: audit: type=1103 audit(1707503844.199:1548): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.263431 kernel: audit: type=1006 audit(1707503844.199:1549): pid=5471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 18:37:24.199000 audit[5471]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff558eee0 a2=3 a3=1 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:24.290535 kernel: audit: type=1300 audit(1707503844.199:1549): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff558eee0 a2=3 a3=1 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:24.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:24.300244 kernel: audit: type=1327 audit(1707503844.199:1549): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:24.302345 systemd-logind[1340]: New session 24 of user core. Feb 9 18:37:24.302825 systemd[1]: Started session-24.scope. Feb 9 18:37:24.307000 audit[5471]: USER_START pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.337000 audit[5475]: CRED_ACQ pid=5475 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.363102 kernel: audit: type=1105 audit(1707503844.307:1550): pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.363353 kernel: audit: type=1103 audit(1707503844.337:1551): pid=5475 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.639487 sshd[5471]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:24.639000 audit[5471]: USER_END pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.642780 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 18:37:24.643629 systemd[1]: sshd@21-10.200.20.36:22-10.200.12.6:59684.service: Deactivated successfully. Feb 9 18:37:24.640000 audit[5471]: CRED_DISP pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.670561 systemd-logind[1340]: Session 24 logged out. Waiting for processes to exit. Feb 9 18:37:24.694794 kernel: audit: type=1106 audit(1707503844.639:1552): pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.694908 kernel: audit: type=1104 audit(1707503844.640:1553): pid=5471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:24.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:59684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:24.695534 systemd-logind[1340]: Removed session 24. Feb 9 18:37:29.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:55996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:29.704370 systemd[1]: Started sshd@22-10.200.20.36:22-10.200.12.6:55996.service. Feb 9 18:37:29.710972 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:29.711095 kernel: audit: type=1130 audit(1707503849.703:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:55996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:30.091000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.093025 sshd[5485]: Accepted publickey for core from 10.200.12.6 port 55996 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:30.119000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.120772 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:30.131861 systemd[1]: run-containerd-runc-k8s.io-92f2d7ff12bb56dbcb1ffe04db5cc4e883fe1c5a1d6674913690b18462fed464-runc.dr6B7S.mount: Deactivated successfully. Feb 9 18:37:30.145047 kernel: audit: type=1101 audit(1707503850.091:1556): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.145171 kernel: audit: type=1103 audit(1707503850.119:1557): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.163616 kernel: audit: type=1006 audit(1707503850.119:1558): pid=5485 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 18:37:30.119000 audit[5485]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc32e3640 a2=3 a3=1 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:30.191950 kernel: audit: type=1300 audit(1707503850.119:1558): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc32e3640 a2=3 a3=1 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:30.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:30.194710 systemd[1]: Started session-25.scope. Feb 9 18:37:30.201630 kernel: audit: type=1327 audit(1707503850.119:1558): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:30.201692 systemd-logind[1340]: New session 25 of user core. Feb 9 18:37:30.207000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.218000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.261412 kernel: audit: type=1105 audit(1707503850.207:1559): pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.261551 kernel: audit: type=1103 audit(1707503850.218:1560): pid=5507 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.503961 sshd[5485]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:30.503000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.507694 systemd-logind[1340]: Session 25 logged out. Waiting for processes to exit. Feb 9 18:37:30.509036 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 18:37:30.510300 systemd-logind[1340]: Removed session 25. Feb 9 18:37:30.510923 systemd[1]: sshd@22-10.200.20.36:22-10.200.12.6:55996.service: Deactivated successfully. Feb 9 18:37:30.504000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.557193 kernel: audit: type=1106 audit(1707503850.503:1561): pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.557294 kernel: audit: type=1104 audit(1707503850.504:1562): pid=5485 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:30.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:55996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:32.173769 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.d9sNRq.mount: Deactivated successfully. Feb 9 18:37:34.891735 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.rkAaXz.mount: Deactivated successfully. Feb 9 18:37:35.166906 systemd[1]: run-containerd-runc-k8s.io-a10ec0e830a5ae31c3616cad1d0a9300e6e700a69e64a23b5177ceb721918a4f-runc.OFT2uv.mount: Deactivated successfully. Feb 9 18:37:35.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:35.574458 systemd[1]: Started sshd@23-10.200.20.36:22-10.200.12.6:56006.service. Feb 9 18:37:35.580117 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:35.580238 kernel: audit: type=1130 audit(1707503855.574:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:35.994000 audit[5595]: USER_ACCT pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:35.995599 sshd[5595]: Accepted publickey for core from 10.200.12.6 port 56006 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:36.022252 kernel: audit: type=1101 audit(1707503855.994:1565): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.023110 sshd[5595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:36.021000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.065491 kernel: audit: type=1103 audit(1707503856.021:1566): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.065646 kernel: audit: type=1006 audit(1707503856.021:1567): pid=5595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 18:37:36.021000 audit[5595]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1ed80c0 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:36.093652 kernel: audit: type=1300 audit(1707503856.021:1567): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1ed80c0 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:36.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:36.103013 kernel: audit: type=1327 audit(1707503856.021:1567): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:36.105608 systemd-logind[1340]: New session 26 of user core. Feb 9 18:37:36.106331 systemd[1]: Started session-26.scope. Feb 9 18:37:36.109000 audit[5595]: USER_START pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.140266 kernel: audit: type=1105 audit(1707503856.109:1568): pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.139000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.165251 kernel: audit: type=1103 audit(1707503856.139:1569): pid=5597 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.442573 sshd[5595]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:36.442000 audit[5595]: USER_END pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.445555 systemd-logind[1340]: Session 26 logged out. Waiting for processes to exit. Feb 9 18:37:36.447112 systemd[1]: sshd@23-10.200.20.36:22-10.200.12.6:56006.service: Deactivated successfully. Feb 9 18:37:36.447928 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 18:37:36.449435 systemd-logind[1340]: Removed session 26. Feb 9 18:37:36.442000 audit[5595]: CRED_DISP pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.497764 kernel: audit: type=1106 audit(1707503856.442:1570): pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.497878 kernel: audit: type=1104 audit(1707503856.442:1571): pid=5595 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:36.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:41.506411 systemd[1]: Started sshd@24-10.200.20.36:22-10.200.12.6:35812.service. Feb 9 18:37:41.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:41.512530 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:41.512622 kernel: audit: type=1130 audit(1707503861.505:1573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:41.892000 audit[5607]: USER_ACCT pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.894302 sshd[5607]: Accepted publickey for core from 10.200.12.6 port 35812 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:41.923242 kernel: audit: type=1101 audit(1707503861.892:1574): pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.921000 audit[5607]: CRED_ACQ pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.923483 sshd[5607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:41.963874 kernel: audit: type=1103 audit(1707503861.921:1575): pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:41.963984 kernel: audit: type=1006 audit(1707503861.921:1576): pid=5607 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 18:37:41.921000 audit[5607]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd311f560 a2=3 a3=1 items=0 ppid=1 pid=5607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:41.991377 kernel: audit: type=1300 audit(1707503861.921:1576): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd311f560 a2=3 a3=1 items=0 ppid=1 pid=5607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:41.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:42.001076 kernel: audit: type=1327 audit(1707503861.921:1576): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:42.004580 systemd[1]: Started session-27.scope. Feb 9 18:37:42.005151 systemd-logind[1340]: New session 27 of user core. Feb 9 18:37:42.008000 audit[5607]: USER_START pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.010000 audit[5610]: CRED_ACQ pid=5610 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.061739 kernel: audit: type=1105 audit(1707503862.008:1577): pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.061873 kernel: audit: type=1103 audit(1707503862.010:1578): pid=5610 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.305799 sshd[5607]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:42.305000 audit[5607]: USER_END pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.309261 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 18:37:42.309986 systemd[1]: sshd@24-10.200.20.36:22-10.200.12.6:35812.service: Deactivated successfully. Feb 9 18:37:42.306000 audit[5607]: CRED_DISP pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.359009 kernel: audit: type=1106 audit(1707503862.305:1579): pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.359132 kernel: audit: type=1104 audit(1707503862.306:1580): pid=5607 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:42.359189 systemd-logind[1340]: Session 27 logged out. Waiting for processes to exit. Feb 9 18:37:42.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:42.360085 systemd-logind[1340]: Removed session 27. Feb 9 18:37:47.375053 systemd[1]: Started sshd@25-10.200.20.36:22-10.200.12.6:49792.service. Feb 9 18:37:47.406512 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:47.406639 kernel: audit: type=1130 audit(1707503867.374:1582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:49792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:47.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:49792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:47.791000 audit[5628]: USER_ACCT pid=5628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.794278 sshd[5628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:47.794872 sshd[5628]: Accepted publickey for core from 10.200.12.6 port 49792 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:47.792000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.844164 kernel: audit: type=1101 audit(1707503867.791:1583): pid=5628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.844305 kernel: audit: type=1103 audit(1707503867.792:1584): pid=5628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.860954 kernel: audit: type=1006 audit(1707503867.792:1585): pid=5628 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 18:37:47.792000 audit[5628]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfcd5d10 a2=3 a3=1 items=0 ppid=1 pid=5628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:47.890846 kernel: audit: type=1300 audit(1707503867.792:1585): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfcd5d10 a2=3 a3=1 items=0 ppid=1 pid=5628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:47.865198 systemd[1]: Started session-28.scope. Feb 9 18:37:47.865819 systemd-logind[1340]: New session 28 of user core. Feb 9 18:37:47.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:47.900957 kernel: audit: type=1327 audit(1707503867.792:1585): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:47.889000 audit[5628]: USER_START pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.891000 audit[5630]: CRED_ACQ pid=5630 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.954399 kernel: audit: type=1105 audit(1707503867.889:1586): pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:47.954502 kernel: audit: type=1103 audit(1707503867.891:1587): pid=5630 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:48.197012 sshd[5628]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:48.196000 audit[5628]: USER_END pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:48.199939 systemd-logind[1340]: Session 28 logged out. Waiting for processes to exit. Feb 9 18:37:48.201115 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 18:37:48.202360 systemd-logind[1340]: Removed session 28. Feb 9 18:37:48.202983 systemd[1]: sshd@25-10.200.20.36:22-10.200.12.6:49792.service: Deactivated successfully. Feb 9 18:37:48.196000 audit[5628]: CRED_DISP pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:48.251221 kernel: audit: type=1106 audit(1707503868.196:1588): pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:48.251382 kernel: audit: type=1104 audit(1707503868.196:1589): pid=5628 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:48.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:49792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:53.268029 systemd[1]: Started sshd@26-10.200.20.36:22-10.200.12.6:49794.service. Feb 9 18:37:53.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:53.276735 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:37:53.276874 kernel: audit: type=1130 audit(1707503873.266:1591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:53.684000 audit[5642]: USER_ACCT pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.686053 sshd[5642]: Accepted publickey for core from 10.200.12.6 port 49794 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:37:53.711000 audit[5642]: CRED_ACQ pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.713376 sshd[5642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:37:53.737291 kernel: audit: type=1101 audit(1707503873.684:1592): pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.737427 kernel: audit: type=1103 audit(1707503873.711:1593): pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.753539 kernel: audit: type=1006 audit(1707503873.711:1594): pid=5642 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 18:37:53.711000 audit[5642]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0c615b0 a2=3 a3=1 items=0 ppid=1 pid=5642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:53.780648 kernel: audit: type=1300 audit(1707503873.711:1594): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0c615b0 a2=3 a3=1 items=0 ppid=1 pid=5642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:53.757333 systemd-logind[1340]: New session 29 of user core. Feb 9 18:37:53.757854 systemd[1]: Started session-29.scope. Feb 9 18:37:53.711000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:53.790389 kernel: audit: type=1327 audit(1707503873.711:1594): proctitle=737368643A20636F7265205B707269765D Feb 9 18:37:53.761000 audit[5642]: USER_START pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.763000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.844249 kernel: audit: type=1105 audit(1707503873.761:1595): pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:53.844401 kernel: audit: type=1103 audit(1707503873.763:1596): pid=5644 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:54.083653 sshd[5642]: pam_unix(sshd:session): session closed for user core Feb 9 18:37:54.083000 audit[5642]: USER_END pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:54.087465 systemd-logind[1340]: Session 29 logged out. Waiting for processes to exit. Feb 9 18:37:54.088596 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 18:37:54.089766 systemd-logind[1340]: Removed session 29. Feb 9 18:37:54.090326 systemd[1]: sshd@26-10.200.20.36:22-10.200.12.6:49794.service: Deactivated successfully. Feb 9 18:37:54.084000 audit[5642]: CRED_DISP pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:54.135826 kernel: audit: type=1106 audit(1707503874.083:1597): pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:54.135909 kernel: audit: type=1104 audit(1707503874.084:1598): pid=5642 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:37:54.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:49794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:37:55.806000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.806000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40085a2630 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.833000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.833000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.833000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40081b1470 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.833000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400cc18400 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.838000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.838000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40081b14a0 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.864000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.864000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.864000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400cc18500 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.864000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.864000 audit[2343]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40081b1500 a2=fc6 a3=0 items=0 ppid=2207 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c604 key=(null) Feb 9 18:37:55.864000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:37:55.962000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.962000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001080cf0 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:55.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:37:55.962000 audit[2303]: AVC avc: denied { watch } for pid=2303 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:37:55.962000 audit[2303]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400104a240 a2=fc6 a3=0 items=0 ppid=2146 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:37:55.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:02.176446 systemd[1]: run-containerd-runc-k8s.io-f7ebf34270de0cf76905b2fc11693d66432e98243432c9bfe4112f0de0f259c8-runc.c9xEYC.mount: Deactivated successfully. Feb 9 18:38:04.897812 systemd[1]: run-containerd-runc-k8s.io-f875446c555fcc945462017021a2f9178c9ee3a255426b8536ab079777e88c0e-runc.sIMY2b.mount: Deactivated successfully. Feb 9 18:38:07.238857 systemd[1]: cri-containerd-d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2.scope: Deactivated successfully. Feb 9 18:38:07.239160 systemd[1]: cri-containerd-d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2.scope: Consumed 3.772s CPU time. Feb 9 18:38:07.241000 audit: BPF prog-id=80 op=UNLOAD Feb 9 18:38:07.248037 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 18:38:07.248151 kernel: audit: type=1334 audit(1707503887.241:1608): prog-id=80 op=UNLOAD Feb 9 18:38:07.241000 audit: BPF prog-id=100 op=UNLOAD Feb 9 18:38:07.262134 kernel: audit: type=1334 audit(1707503887.241:1609): prog-id=100 op=UNLOAD Feb 9 18:38:07.276906 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2-rootfs.mount: Deactivated successfully. Feb 9 18:38:07.277691 env[1356]: time="2024-02-09T18:38:07.277647283Z" level=info msg="shim disconnected" id=d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2 Feb 9 18:38:07.278172 env[1356]: time="2024-02-09T18:38:07.278139841Z" level=warning msg="cleaning up after shim disconnected" id=d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2 namespace=k8s.io Feb 9 18:38:07.278268 env[1356]: time="2024-02-09T18:38:07.278253951Z" level=info msg="cleaning up dead shim" Feb 9 18:38:07.285875 env[1356]: time="2024-02-09T18:38:07.285802342Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5758 runtime=io.containerd.runc.v2\n" Feb 9 18:38:08.092530 kubelet[2458]: I0209 18:38:08.092501 2458 scope.go:117] "RemoveContainer" containerID="d98e443bd3fc2c6ce9be9a5f76e80e3f8c6ac27db5b6b36bf187015d9e8272e2" Feb 9 18:38:08.095332 env[1356]: time="2024-02-09T18:38:08.095295283Z" level=info msg="CreateContainer within sandbox \"ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 18:38:08.123004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount499071596.mount: Deactivated successfully. Feb 9 18:38:08.140541 env[1356]: time="2024-02-09T18:38:08.140479122Z" level=info msg="CreateContainer within sandbox \"ed7cb961a4e5c5b6c8346b431faf924346fafdc72c3b1acdadbb76b46100fd7a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"84831b7b513b45ad876ac2861247b266a628f7065b7bc84309b2aa04354b639d\"" Feb 9 18:38:08.140980 env[1356]: time="2024-02-09T18:38:08.140956561Z" level=info msg="StartContainer for \"84831b7b513b45ad876ac2861247b266a628f7065b7bc84309b2aa04354b639d\"" Feb 9 18:38:08.162220 systemd[1]: Started cri-containerd-84831b7b513b45ad876ac2861247b266a628f7065b7bc84309b2aa04354b639d.scope. Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216085 kernel: audit: type=1400 audit(1707503888.175:1610): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216266 kernel: audit: type=1400 audit(1707503888.175:1611): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235770 kernel: audit: type=1400 audit(1707503888.175:1612): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.255590 kernel: audit: type=1400 audit(1707503888.175:1613): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.276861 kernel: audit: type=1400 audit(1707503888.175:1614): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.300760 kernel: audit: type=1400 audit(1707503888.175:1615): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.322109 kernel: audit: type=1400 audit(1707503888.175:1616): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.342643 kernel: audit: type=1400 audit(1707503888.175:1617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit: BPF prog-id=199 op=LOAD Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2146 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:08.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383331623762353133623435616438373661633238363132343762 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2146 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:08.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383331623762353133623435616438373661633238363132343762 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.197000 audit: BPF prog-id=200 op=LOAD Feb 9 18:38:08.197000 audit[5779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2146 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:08.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383331623762353133623435616438373661633238363132343762 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.216000 audit: BPF prog-id=201 op=LOAD Feb 9 18:38:08.216000 audit[5779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2146 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:08.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383331623762353133623435616438373661633238363132343762 Feb 9 18:38:08.235000 audit: BPF prog-id=201 op=UNLOAD Feb 9 18:38:08.235000 audit: BPF prog-id=200 op=UNLOAD Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { perfmon } for pid=5779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit[5779]: AVC avc: denied { bpf } for pid=5779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:08.235000 audit: BPF prog-id=202 op=LOAD Feb 9 18:38:08.235000 audit[5779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2146 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:08.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383331623762353133623435616438373661633238363132343762 Feb 9 18:38:08.359488 env[1356]: time="2024-02-09T18:38:08.359441511Z" level=info msg="StartContainer for \"84831b7b513b45ad876ac2861247b266a628f7065b7bc84309b2aa04354b639d\" returns successfully" Feb 9 18:38:08.462000 audit: BPF prog-id=121 op=UNLOAD Feb 9 18:38:08.462032 systemd[1]: cri-containerd-50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5.scope: Deactivated successfully. Feb 9 18:38:08.462402 systemd[1]: cri-containerd-50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5.scope: Consumed 5.079s CPU time. Feb 9 18:38:08.468000 audit: BPF prog-id=124 op=UNLOAD Feb 9 18:38:08.483594 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5-rootfs.mount: Deactivated successfully. Feb 9 18:38:08.485184 env[1356]: time="2024-02-09T18:38:08.485144073Z" level=info msg="shim disconnected" id=50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5 Feb 9 18:38:08.485414 env[1356]: time="2024-02-09T18:38:08.485393891Z" level=warning msg="cleaning up after shim disconnected" id=50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5 namespace=k8s.io Feb 9 18:38:08.485503 env[1356]: time="2024-02-09T18:38:08.485489603Z" level=info msg="cleaning up dead shim" Feb 9 18:38:08.496561 env[1356]: time="2024-02-09T18:38:08.496511856Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5821 runtime=io.containerd.runc.v2\n" Feb 9 18:38:08.741000 audit[4792]: AVC avc: denied { watch } for pid=4792 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.3398187974/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c597,c679 tclass=file permissive=0 Feb 9 18:38:08.741000 audit[4792]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010e33e0 a2=fc6 a3=0 items=0 ppid=4665 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c597,c679 key=(null) Feb 9 18:38:08.741000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:38:08.911740 kubelet[2458]: E0209 18:38:08.911674 2458 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.36:57656->10.200.20.15:2379: read: connection timed out" Feb 9 18:38:09.098518 kubelet[2458]: I0209 18:38:09.098482 2458 scope.go:117] "RemoveContainer" containerID="50b774f4f096f32f73f2cc5e9931ef737bab4b448f8d8c2cff4898bb127536f5" Feb 9 18:38:09.100568 env[1356]: time="2024-02-09T18:38:09.100532452Z" level=info msg="CreateContainer within sandbox \"bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 18:38:09.147765 env[1356]: time="2024-02-09T18:38:09.147708522Z" level=info msg="CreateContainer within sandbox \"bd2169f29032c2ad9738fcf3b6b21074733cf6b147e84ca6d7d62c9a9f237582\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"428764acec0521b4614ca5d2ef61986e1c0bcec133afef2d54e6ada9001ddbfd\"" Feb 9 18:38:09.148521 env[1356]: time="2024-02-09T18:38:09.148495894Z" level=info msg="StartContainer for \"428764acec0521b4614ca5d2ef61986e1c0bcec133afef2d54e6ada9001ddbfd\"" Feb 9 18:38:09.176298 systemd[1]: Started cri-containerd-428764acec0521b4614ca5d2ef61986e1c0bcec133afef2d54e6ada9001ddbfd.scope. Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.196000 audit: BPF prog-id=203 op=LOAD Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2617 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:09.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383736346163656330353231623436313463613564326566363139 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2617 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:09.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383736346163656330353231623436313463613564326566363139 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit: BPF prog-id=204 op=LOAD Feb 9 18:38:09.197000 audit[5842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2617 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:09.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383736346163656330353231623436313463613564326566363139 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit: BPF prog-id=205 op=LOAD Feb 9 18:38:09.197000 audit[5842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2617 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:09.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383736346163656330353231623436313463613564326566363139 Feb 9 18:38:09.197000 audit: BPF prog-id=205 op=UNLOAD Feb 9 18:38:09.197000 audit: BPF prog-id=204 op=UNLOAD Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { perfmon } for pid=5842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit[5842]: AVC avc: denied { bpf } for pid=5842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:09.197000 audit: BPF prog-id=206 op=LOAD Feb 9 18:38:09.197000 audit[5842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2617 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:09.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383736346163656330353231623436313463613564326566363139 Feb 9 18:38:09.216617 env[1356]: time="2024-02-09T18:38:09.216567690Z" level=info msg="StartContainer for \"428764acec0521b4614ca5d2ef61986e1c0bcec133afef2d54e6ada9001ddbfd\" returns successfully" Feb 9 18:38:09.943000 audit[4830]: AVC avc: denied { watch } for pid=4830 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_35_03.225426837/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c153,c291 tclass=file permissive=0 Feb 9 18:38:09.943000 audit[4830]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001f45f80 a2=fc6 a3=0 items=0 ppid=4737 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c153,c291 key=(null) Feb 9 18:38:09.943000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:38:10.661000 audit[5791]: AVC avc: denied { watch } for pid=5791 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:10.661000 audit[5791]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400013c390 a2=fc6 a3=0 items=0 ppid=2146 pid=5791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:38:10.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:10.661000 audit[5791]: AVC avc: denied { watch } for pid=5791 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:38:10.661000 audit[5791]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000154260 a2=fc6 a3=0 items=0 ppid=2146 pid=5791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c868 key=(null) Feb 9 18:38:10.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:38:11.469151 kubelet[2458]: E0209 18:38:11.469034 2458 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-8e9ed585e1.17b245bba9a10670", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-8e9ed585e1", UID:"af4d05f8896aa759685b76deb6492111", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Liveness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-8e9ed585e1"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 38, 1, 33942640, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 38, 1, 33942640, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-8e9ed585e1"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.36:57440->10.200.20.15:2379: read: connection timed out' (will not retry!) Feb 9 18:38:14.134058 systemd[1]: cri-containerd-371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535.scope: Deactivated successfully. Feb 9 18:38:14.134396 systemd[1]: cri-containerd-371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535.scope: Consumed 1.560s CPU time. Feb 9 18:38:14.143230 kernel: kauditd_printk_skb: 120 callbacks suppressed Feb 9 18:38:14.143366 kernel: audit: type=1334 audit(1707503894.136:1652): prog-id=84 op=UNLOAD Feb 9 18:38:14.136000 audit: BPF prog-id=84 op=UNLOAD Feb 9 18:38:14.136000 audit: BPF prog-id=93 op=UNLOAD Feb 9 18:38:14.156407 kernel: audit: type=1334 audit(1707503894.136:1653): prog-id=93 op=UNLOAD Feb 9 18:38:14.168701 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535-rootfs.mount: Deactivated successfully. Feb 9 18:38:14.170678 env[1356]: time="2024-02-09T18:38:14.170616643Z" level=info msg="shim disconnected" id=371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535 Feb 9 18:38:14.170678 env[1356]: time="2024-02-09T18:38:14.170678318Z" level=warning msg="cleaning up after shim disconnected" id=371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535 namespace=k8s.io Feb 9 18:38:14.171178 env[1356]: time="2024-02-09T18:38:14.170692557Z" level=info msg="cleaning up dead shim" Feb 9 18:38:14.179012 env[1356]: time="2024-02-09T18:38:14.178958689Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:38:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5887 runtime=io.containerd.runc.v2\n" Feb 9 18:38:15.113664 kubelet[2458]: I0209 18:38:15.113631 2458 scope.go:117] "RemoveContainer" containerID="371a90a7b55a5f81f95a3759ea607cdba409c8eb8536ec97be4a56c197d45535" Feb 9 18:38:15.115693 env[1356]: time="2024-02-09T18:38:15.115655193Z" level=info msg="CreateContainer within sandbox \"4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 18:38:15.160467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1616104733.mount: Deactivated successfully. Feb 9 18:38:15.179919 env[1356]: time="2024-02-09T18:38:15.179870939Z" level=info msg="CreateContainer within sandbox \"4210e377137ede9d50c3488ff1941c20daedc906e3ba17ec111ebd58dee5f4a0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"7bd2c32a41708807f3259d6e4a180125d3eeb05574b2fe1038b49591bf9bf3ed\"" Feb 9 18:38:15.180938 env[1356]: time="2024-02-09T18:38:15.180886852Z" level=info msg="StartContainer for \"7bd2c32a41708807f3259d6e4a180125d3eeb05574b2fe1038b49591bf9bf3ed\"" Feb 9 18:38:15.201865 systemd[1]: Started cri-containerd-7bd2c32a41708807f3259d6e4a180125d3eeb05574b2fe1038b49591bf9bf3ed.scope. Feb 9 18:38:15.212674 systemd[1]: run-containerd-runc-k8s.io-7bd2c32a41708807f3259d6e4a180125d3eeb05574b2fe1038b49591bf9bf3ed-runc.wCiivF.mount: Deactivated successfully. Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.261683 kernel: audit: type=1400 audit(1707503895.221:1654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.261815 kernel: audit: type=1400 audit(1707503895.221:1655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282638 kernel: audit: type=1400 audit(1707503895.221:1656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.304525 kernel: audit: type=1400 audit(1707503895.221:1657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.324271 kernel: audit: type=1400 audit(1707503895.221:1658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.324617 kernel: audit: type=1400 audit(1707503895.221:1659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.366527 kernel: audit: type=1400 audit(1707503895.221:1660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.366644 kernel: audit: type=1400 audit(1707503895.221:1661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.241000 audit: BPF prog-id=207 op=LOAD Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2165 pid=5909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:15.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643263333261343137303838303766333235396436653461313830 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2165 pid=5909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:15.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643263333261343137303838303766333235396436653461313830 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit: BPF prog-id=208 op=LOAD Feb 9 18:38:15.281000 audit[5909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2165 pid=5909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:15.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643263333261343137303838303766333235396436653461313830 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.281000 audit: BPF prog-id=209 op=LOAD Feb 9 18:38:15.281000 audit[5909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2165 pid=5909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:15.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643263333261343137303838303766333235396436653461313830 Feb 9 18:38:15.282000 audit: BPF prog-id=209 op=UNLOAD Feb 9 18:38:15.282000 audit: BPF prog-id=208 op=UNLOAD Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { perfmon } for pid=5909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit[5909]: AVC avc: denied { bpf } for pid=5909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:38:15.282000 audit: BPF prog-id=210 op=LOAD Feb 9 18:38:15.282000 audit[5909]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2165 pid=5909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762643263333261343137303838303766333235396436653461313830 Feb 9 18:38:15.412449 env[1356]: time="2024-02-09T18:38:15.412391326Z" level=info msg="StartContainer for \"7bd2c32a41708807f3259d6e4a180125d3eeb05574b2fe1038b49591bf9bf3ed\" returns successfully" Feb 9 18:38:18.317413 kubelet[2458]: I0209 18:38:18.317332 2458 status_manager.go:853] "Failed to get status for pod" podUID="af4d05f8896aa759685b76deb6492111" pod="kube-system/kube-apiserver-ci-3510.3.2-a-8e9ed585e1" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.36:57576->10.200.20.15:2379: read: connection timed out" Feb 9 18:38:18.912678 kubelet[2458]: E0209 18:38:18.912629 2458 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:28.913449 kubelet[2458]: E0209 18:38:28.913407 2458 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-8e9ed585e1?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:31.449551 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.467098 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.485420 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.502277 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.520080 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.546508 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.546784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.556397 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.556618 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.575429 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.575692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.595781 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.596091 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.615395 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.635525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.635658 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.635764 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.654662 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.654944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.673672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.673922 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.720010 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753175 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753428 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753530 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753630 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.753829 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.765671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.766190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.784894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.785193 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.794225 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.812898 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.813178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.830559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.830852 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.848786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.849094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.866947 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.867271 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.886011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.886358 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.914761 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.915163 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.915358 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.923750 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.932707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.941380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.949846 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.958882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.967714 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.976602 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.985061 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:31.994101 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.002957 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.011331 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.019769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.028354 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.037155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.045924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.054487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.062952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.071523 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.080017 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.088573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.097250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.105972 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.114656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.123690 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.132855 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.141558 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.151458 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.160353 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.169756 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.178897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.188072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.196716 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.205273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.214038 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.222558 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.231112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.240042 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.249128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.258145 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.267167 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.276316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.285043 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.293909 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.302853 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.311895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.320581 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.329059 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.337862 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.346932 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.356057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.364807 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.373868 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.382541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.391238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.400109 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.408373 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.416913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.425621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.434448 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.443648 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.452470 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.460948 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.470451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.479924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.488861 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.498267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.507333 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.516106 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.525365 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.534454 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.543486 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.552531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.561236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.570122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.579024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.588337 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.597774 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.606421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.615086 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.623921 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.632959 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.642578 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.651942 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.660782 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.669355 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.678070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.686905 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.696191 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.705509 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.714324 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.723314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.732304 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.740848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.749282 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.758058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.767260 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.776082 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.785278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.794002 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.802968 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.812320 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.821499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.830903 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.839999 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.849221 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.858231 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.867357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.876016 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.884705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.893902 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.902955 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.911643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.920391 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.929485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.938872 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.947512 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.956300 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.965362 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.974618 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.983795 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:32.992487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.001554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.010463 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.019955 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.028966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.038129 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.047006 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.056297 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#239 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:33.065552 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#238 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001